Connectivity Guide

tacacs-server vrf
Creates an association between a TACACS server group and a VRF and source interface.
Syntax
tacacs-server vrf {management | vrf-name}
Parameters
management — Enter the keyword to associate TACACS servers to the management VRF instance. This
option restricts the TACACS server association to the management VRF only.
vrf-name — Enter the keyword then the name of the VRF to associate TACACS servers with that VRF.
Defaults None.
Command Mode CONFIGURATION
Usage Information
Use this command to associate TACACS servers with a VRF instance. If you do not congure a VRF in the
TACACS server list, the servers are on the default VRF instance. TACACS server lists and VRFs have one-to-one
mapping. When you remove the VRF instance, the TACACS server lists are also removed automatically.
The no version of this command resets the value to the default.
Example
[no] tacacs-server management
[no] tacacs-server vrf red
Supported Releases 10.4.3.0E or later
username password role
Creates an authentication entry based on a user name and password, and assigns a role to the user.
Syntax
username username password password role role [ priv-lvl privilege-level]
Parameters
username username—Enter a text string. A maximum of 32 alphanumeric characters; one character
minimum.
password password—Enter a text string. A maximum of 32 alphanumeric characters; nine characters
minimum.
role role—Enter a user role:
sysadmin—Full access to all commands in the system, exclusive access to commands that manipulate
the le system, and access to the system shell. A system administrator can create user IDs and user roles.
secadmin—Full access to conguration commands that set security policy and system access, such as
password strength, AAA authorization, and cryptographic keys. A security administrator can display security
information, such as cryptographic keys, login statistics, and log information.
netadmin—Full access to conguration commands that manage trac owing through the switch, such
as routes, interfaces, and ACLs. A network administrator cannot access conguration commands for
security features or view security information.
netoperator—Access to EXEC mode to view the current conguration. A network operator cannot
modify any conguration setting on a switch.
priv-lvl privilege-level—Enter a privilege level, from 0 to 15. If you do not specify the priv-lvl
option, the system assigns privilege level 1 for the netoperator user and privilege level 15 for the
sysadmin, secadmin, and netadmin users.
824 Security