hit counter script

Configuring Radius Authorization For User Privileged Access And Network Services - Cisco Catalyst 2960-XR Security Configuration Manual

Ios release 15.0 2 ex1
Hide thumbs Also See for Catalyst 2960-XR:
Table of Contents

Advertisement

Configuring RADIUS
Related Topics
Identifying the RADIUS Server Host, on page 65
RADIUS Server Host, on page 62
AAA Server Groups, on page 63
Configuring RADIUS Authorization for User Privileged Access and Network
Services
Authorization is bypassed for authenticated users who log in through the CLI even if authorization has
Note
been configured.
Beginning in privileged EXEC mode, follow these steps to configure RADIUS authorization for user priviledged
access and network services:
SUMMARY STEPS
1. configure terminal
2. aaa authorization network radius
3. aaa authorization exec radius
4. end
DETAILED STEPS
Command or Action
Step 1
configure terminal
Example:
Switch# configure terminal
Step 2
aaa authorization network radius
Example:
Switch(config)# aaa authorization network
radius
Step 3
aaa authorization exec radius
Example:
Switch(config)# aaa authorization exec radius
OL-29434-01

Configuring RADIUS Authorization for User Privileged Access and Network Services

Purpose
Enters the global configuration mode.
Configures the switch for user RADIUS authorization for all
network-related service requests.
Configures the switch for user RADIUS authorization if the
user has privileged EXEC access.
The exec keyword might return user profile information (such
as autocommand information).
Catalyst 2960-XR Switch Security Configuration Guide, Cisco IOS Release 15.0(2)EX1
71

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents