Connectivity Guide
tacacs-server vrf
Creates an association between a TACACS server group and a VRF and source interface.
Syntax
tacacs-server vrf {management | vrf-name}
Parameters
• management — Enter the keyword to associate TACACS servers to the management VRF instance. This 
option restricts the TACACS server association to the management VRF only.
• vrf-name — Enter the keyword then the name of the VRF to associate TACACS servers with that VRF.
Defaults None.
Command Mode CONFIGURATION
Usage Information
Use this command to associate TACACS servers with a VRF instance. If you do not congure a VRF in the 
TACACS server list, the servers are on the default VRF instance. TACACS server lists and VRFs have one-to-one 
mapping. When you remove the VRF instance, the TACACS server lists are also removed automatically.
The no version of this command resets the value to the default.
Example
[no] tacacs-server management
[no] tacacs-server vrf red
Supported Releases 10.4.3.0E or later
username password role
Creates an authentication entry based on a user name and password, and assigns a role to the user.
Syntax
username username password password role role [ priv-lvl privilege-level]
Parameters
• username username—Enter a text string. A maximum of 32 alphanumeric characters; one character 
minimum.
• password password—Enter a text string. A maximum of 32 alphanumeric characters; nine characters 
minimum.
•
role role—Enter a user role:
– sysadmin—Full access to all commands in the system, exclusive access to commands that manipulate 
the le system, and access to the system shell. A system administrator can create user IDs and user roles.
– secadmin—Full access to conguration commands that set security policy and system access, such as 
password strength, AAA authorization, and cryptographic keys. A security administrator can display security 
information, such as cryptographic keys, login statistics, and log information.
– netadmin—Full access to conguration commands that manage trac owing through the switch, such 
as routes, interfaces, and ACLs. A network administrator cannot access conguration commands for 
security features or view security information.
– netoperator—Access to EXEC mode to view the current conguration. A network operator cannot 
modify any conguration setting on a switch.
• priv-lvl privilege-level—Enter a privilege level, from 0 to 15. If you do not specify the priv-lvl 
option, the system assigns privilege level 1 for the netoperator user and privilege level 15 for the 
sysadmin, secadmin, and netadmin users.
824 Security










