Technical data

ServerIron ADX Administration Guide 145
53-1002434-01
Integrating RBM with RADIUS and TACACS+
3
ServerIronADX(config)# radius-server host 10.10.10.10 auth-port 1812 acct-port
1813 default
ServerIronADX(config)# radius-server key brocade
Configuring a ServerIron ADX for authentication by a TACACS+ server
Procedures for configuring a ServerIron ADX for authentication by a TACACS+ server are described
in detail in “Configuring TACACS or TACACS+ security” on page 106. The following example is a
standard ServerIron ADX configuration for enabling AAA authentication and authorization by a
TACACS+ server with the following settings:
Default authentication for “web-server” access is provided locally.
Exec authorization is configured to have the user’s privilege level authorized by a TACACS+
server.
TACACS+ is set as the default authentication method for login
The server at IP address 10.10.10.10 is identified as the TACACS+ server.
ServerIronADX(config)# aaa authentication web-server default local
ServerIronADX(config)# aaa authorization exec default tacacs+
ServerIronADX(config)# aaa authentication login default tacacs+
ServerIronADX(config)# tacacs-server host 10.10.10.10 auth-port 49 default key 1
$D?@d=8
Configuring a role template at the global level (RADIUS or TACACS+)
The following commands configure a role template named “brcd” on a ServerIron ADX at the global
level and associates that template to the user named “user1.”
ServerIronADX(config)# role template brcd
ServerIronADX(config-role-template-r1)# context c1 operator
ServerIronADX(config-role-template-r1)# context c2 manager
ServerIronADX(config-role-template-r1)# context c3 viewer
ServerIronADX(config-role-template-r1)# exit
ServerIronADX(config)# username user1 privilege 1 password pass2
ServerIronADX(config-role-user-user1)# role template brcd