PurposeCommand or Action
authentication default
Returns to privileged EXEC mode.end
Example:
Switch(config-line)# end
Step 6
Related Topics
TACACS+ Login Authentication, on page 42
Prerequisites for Controlling Switch Access with Terminal Access Controller Access Control System Plus
(TACACS+), on page 37
Configuring TACACS+ Authorization for Privileged EXEC Access and Network
Services
You can use the aaa authorization global configuration command with the tacacs+ keyword to set parameters
that restrict a user’s network access to privileged EXEC mode.
The aaa authorization exec tacacs+ local command sets these authorization parameters:
•
Use TACACS+ for privileged EXEC access authorization if authentication was performed by using
TACACS+.
•
Use the local database if authentication was not performed by using TACACS+.
Authorization is bypassed for authenticated users who log in through the CLI even if authorization has
been configured.
Note
SUMMARY STEPS
1.
configure terminal
2.
aaa authorization network tacacs+
3.
aaa authorization exec tacacs+
4.
end
Catalyst 2960-XR Switch Security Configuration Guide, Cisco IOS Release 15.0(2)EX1
OL-29434-01 47
Configuring TACACS+
Configuring TACACS+ Authorization for Privileged EXEC Access and Network Services