Technical data
106 ServerIron ADX Administration Guide
53-1002434-01
Configuring TACACS or TACACS+ security
2
To display user account information, enter the following command.
ServerIronADX(config)# show users
Username Password Encrypt Priv Status Expire
Time
=================================================================================
==
admin $1$T62..hu1$hmRolcV1Vwc.FCtXVD6h9/ enabled 0 enabled
Never
Syntax: show users
Configuring TACACS or TACACS+ security
You can use the security protocol Terminal Access Controller Access Control System (TACACS) or
TACACS+ to authenticate the following kinds of access to the ServerIron.
• Telnet access
• SSH access
• Web management access
• Access to the Privileged EXEC level and CONFIG levels of the CLI
NOTE
You cannot authenticate IronView (SNMP) access to a ServerIron using TACACS or TACACS+.
The TACACS and TACACS+ protocols define how authentication, authorization, and accounting
information is sent between a ServerIron and an authentication database on a TACACS or TACACS+
server. TACACS or TACACS+ services are maintained in a database, typically on a UNIX workstation
or PC with a TACACS or TACACS+ server running.
How TACACS+ differs from TACACS
TACACS is a simple UDP-based access control protocol originally developed by BBN for MILNET.
TACACS+ is an enhancement to TACACS and uses TCP to ensure reliable delivery.
TACACS+ is an enhancement to the TACACS security protocol. TACACS+ improves on TACACS by
separating the functions of authentication, authorization, and accounting (AAA) and by encrypting
all traffic between the ServerIron and the TACACS+ server. TACACS+ allows for arbitrary length and
content authentication exchanges, which allow any authentication mechanism to be utilized with
the ServerIron. TACACS+ is extensible to provide for site customization and future development
features. The protocol allows the ServerIron to request very precise access control and allows the
TACACS+ server to respond to each component of that request.
NOTE
TACACS+ provides for authentication, authorization, and accounting, but an implementation or
configuration is not required to employ all three.










