1-10
Catalyst 3750-X and 3560-X Switch Software Configuration Guide
OL-25303-03
Chapter 1 Configuring Switch-Based Authentication
Controlling Switch Access with TACACS+
Controlling Switch Access with TACACS+
This section describes how to enable and configure Terminal Access Controller Access Control System
Plus (TACACS+), which provides detailed accounting information and flexible administrative control
over authentication and authorization processes. TACACS+ is facilitated through authentication,
authorization, accounting (AAA) and can be enabled only through AAA commands.
Beginning with Cisco IOS Release 12.2(58)SE, the switch supports TACACS+ for IPv6. Information is
in the “TACACS+ Over an IPv6 Transport” section of the “Implementing ADSL for IPv6” chapter in the
Cisco IOS XE IPv6 Configuration Guide, Release 2.
For information about configuring this feature, see the “Configuring TACACS+ over IPv6” section of
the “Implementing ADSL for IPv6” chapter in the Cisco IOS XE IPv6 Configuration Guide, Release 2.
Note For complete syntax and usage information for the commands used in this section, see the Cisco IOS
Security Command Reference, Release 12.4 and the Cisco IOS IPv6 Command Reference.
These sections contain this configuration information:
• Understanding TACACS+, page 1-10
• TACACS+ Operation, page 1-12
• Configuring TACACS+, page 1-12
• Displaying the TACACS+ Configuration, page 1-17
Understanding TACACS+
TACACS+ is a security application that provides centralized validation of users attempting to gain access
to your switch. TACACS+ services are maintained in a database on a TACACS+ daemon typically
running on a UNIX or Windows NT workstation. You should have access to and should configure a
TACACS+ server before you configure TACACS+ features on your switch.
Note We recommend a redundant connection between a switch stack and the TACACS+ server. This is to help
ensure that the TACACS+ server remains accessible in case one of the connected stack members is
removed from the switch stack.
TACACS+ provides for separate and modular authentication, authorization, and accounting facilities.
TACACS+ allows for a single access control server (the TACACS+ daemon) to provide each
service—authentication, authorization, and accounting—independently. Each service can be tied into its
own database to take advantage of other services available on that server or on the network, depending
on the capabilities of the daemon.
The goal of TACACS+ is to provide a method for managing multiple network access points from a single
management service. Your switch can be a network access server along with other Cisco routers and
access servers. A network access server provides connections to a single user, to a network or
subnetwork, and to interconnected networks as shown in Figure 1-1.