
Chapter 6: Administration Tasks Not Performed in the Web Manager 139
The following screen example shows entries that define the RADIUS authentication server and
the accounting server to be the same server with the same IP address, sets the secret to
cyclades, the time
-out to 5 seconds and the number of retries to 5.
NOTE: Always configure both parameters auth1 and acct1.
10. Save and quit the file.
NOTE: Multiple RADIUS servers can be configured in this file. The servers are tried in the order in which they
appear. If a server fails to respond, the next configured server is tried.
Configuring group authorization for TACACS+ authentication
The two tasks listed below must be done to configure groups for TACACS+ authentication.
• The TACACS+ server’s administrator must define the desired groups and assign users to
the groups.
• The SP manager administrator must configure the TACACS+ server on the SP manager. The
administrator of the SP manager, must configure the TACACS+ authentication server for raw
access. Table 6.5 lists two ways to perform the needed configuration.
The following cli utility command line can also be used to configure a server for raw access:
cli> set auth tacplus service raccess
To assign a group to a user on the TACACS+ server:
1. Add a definition for the group to the authentication authorization accounting (AAA) database
on the TACACS+ server.
auth1 172.20.0.2 cyclades 5 5
acct1 172.20.0.2 cyclades 5 5
Table 6.5: Methods for Configuring the TACACS+ Authentication Server for Raw Access
Method Where Documented
Web Manager To Configure a TACACS+ Authentication Server [Expert] on page 286
NOTE: Make sure to check the Enable Raccess Authorization checkbox.
SP manager command line Configuring a TACACS+ authentication server on the SP manager on page
140
Komentáře k této Příručce