12.07.2015 Views

Brocade MLX Series and Brocade NetIron XMR Diagnostic Guide ...

Brocade MLX Series and Brocade NetIron XMR Diagnostic Guide ...

Brocade MLX Series and Brocade NetIron XMR Diagnostic Guide ...

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

TACACS <strong>and</strong> TACACAS+ 9TACACS <strong>and</strong> TACACAS+• If you do not enable Telnet access, you can access the CLI using a serial connection to themanagement module. If you do not enable SNMP access, you will not be able to use <strong>Brocade</strong>Network Advisor or third-party SNMP management applications.• You cannot authenticate Simple Network Management Protocol (SNMP) access to a <strong>Brocade</strong>device using TACACS or TACACS+.• <strong>Brocade</strong> devices do not support RADIUS security for SNMP access.• The TACACS or TACACS+, RADIUS, <strong>and</strong> Telnet login password authentication methods are notsupported for SNMP access.• For CLI access, you must configure authentication-method lists if you want the device toauthenticate access using local user accounts or a RADIUS server. Otherwise, the device willauthenticate using only the locally based password for the Super User privilege level.• When no authentication-method list is configured specifically for Web management access,the device performs authentication using the SNMP community strings:- For read-only access, use the user name “get” <strong>and</strong> the password “public”. The defaultread-only community string is “public”.- There is no default read-write community string, which means you cannot open aread-write management session using the Web management interface. You first mustconfigure a read-write community string using the CLI. Then you can log on using “set” asthe user name <strong>and</strong> the read-write community string you configure as the password.• If you configure an authentication-method list for Web management access <strong>and</strong> specify “local”as the primary authentication method, users who attempt to access the device using the Webmanagement interface must supply a user name <strong>and</strong> password configured in one of the localuser accounts on the device. You cannot access the device by entering “set” or “get” <strong>and</strong> thecorresponding SNMP community string.• For devices that can be managed using <strong>Brocade</strong> Network Advisor, the default authenticationmethod (if no authentication-method list is configured for SNMP) is the CLI Super User levelpassword. If no Super User level password is configured, then access through <strong>Brocade</strong>Network Advisor is not authenticated. To use local user accounts to authenticate accessthrough <strong>Brocade</strong> Network Advisor, configure an authentication-method list for SNMP access<strong>and</strong> specify “local” as the primary authentication method.TACACS+ is an enhancement to the TACACS security protocol. TACACS+ improves on TACACS byseparating the functions of authentication, authorization, <strong>and</strong> accounting (AAA) <strong>and</strong> by encryptingall the traffic between the <strong>Brocade</strong> device <strong>and</strong> the TACACS+ server.TACACS show comm<strong>and</strong>sThis section describes the show comm<strong>and</strong>s that display information about the TACACS servers.show aaaSyntax: show aaaThis comm<strong>and</strong> displays information about all the TACACS+ <strong>and</strong> RADIUS servers identified on thedevice.<strong>Brocade</strong> <strong>MLX</strong> <strong>Series</strong> <strong>and</strong> <strong>Brocade</strong> <strong>NetIron</strong> <strong>XMR</strong> <strong>Diagnostic</strong> <strong>Guide</strong> 31753-1002426-02

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!