<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: AAA on Terminal Server in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/aaa-on-terminal-server/m-p/896820#M407900</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You have to enable AAA on both the Terminal&lt;/P&gt;&lt;P&gt;Server TTY line and the networking devices&lt;/P&gt;&lt;P&gt;console port that connected to the Terminal&lt;/P&gt;&lt;P&gt;Server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;CCIE security&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 28 Jan 2008 20:27:08 GMT</pubDate>
    <dc:creator>cisco24x7</dc:creator>
    <dc:date>2008-01-28T20:27:08Z</dc:date>
    <item>
      <title>AAA on Terminal Server</title>
      <link>https://community.cisco.com/t5/network-access-control/aaa-on-terminal-server/m-p/896818#M407892</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have enabled TACACS+ authentication and authorization for my networking devices. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can also access these devices through my terminal server (cisco router). Telnet Access to the terminal server itself is authenticated with ACS.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My problem is that after a user logs on to the terminal server, the user is able to logon to other networking devices without having to provide the credentials. How do I make it mandatory for a user to provide TACACS+ credentials for devices connected to the terminal server?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have enabled AAA for console and VTY access on the terminal server and the devices. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Suresh&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 22:36:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/aaa-on-terminal-server/m-p/896818#M407892</guid>
      <dc:creator>sureshkrishnan</dc:creator>
      <dc:date>2019-03-10T22:36:57Z</dc:date>
    </item>
    <item>
      <title>Re: AAA on Terminal Server</title>
      <link>https://community.cisco.com/t5/network-access-control/aaa-on-terminal-server/m-p/896819#M407896</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The authentication, authorization, and accounting (AAA) mechanism verifies the identity of, grants access to, and tracks the actions of users managing a switch. All Cisco MDS 9000 Family switches use Remote Access Dial-In User Service (RADIUS) and Terminal Access Controller Access Control System Plus (TACACS+) protocols to provide solutions using remote AAA servers. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Based on the user ID and password combination provided, switches perform local authentication or authorization using the local database or remote authentication or authorization using AAA server(s). A preshared secret key provides security for communication between the switch and AAA servers. This secret key can be configured for all AAA server or for only a specific AAA server. This security mechanism provides a central management capability for AAA servers. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Refer to Configuring RADIUS and TACACS+ for more information&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/docs/storage/san_switches/mds9000/sw/rel_2_x/san-os/configuration/guide/cradtac.html" target="_blank"&gt;http://www.cisco.com/en/US/docs/storage/san_switches/mds9000/sw/rel_2_x/san-os/configuration/guide/cradtac.html&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 28 Jan 2008 19:38:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/aaa-on-terminal-server/m-p/896819#M407896</guid>
      <dc:creator>jbayuka</dc:creator>
      <dc:date>2008-01-28T19:38:13Z</dc:date>
    </item>
    <item>
      <title>Re: AAA on Terminal Server</title>
      <link>https://community.cisco.com/t5/network-access-control/aaa-on-terminal-server/m-p/896820#M407900</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You have to enable AAA on both the Terminal&lt;/P&gt;&lt;P&gt;Server TTY line and the networking devices&lt;/P&gt;&lt;P&gt;console port that connected to the Terminal&lt;/P&gt;&lt;P&gt;Server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;CCIE security&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 28 Jan 2008 20:27:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/aaa-on-terminal-server/m-p/896820#M407900</guid>
      <dc:creator>cisco24x7</dc:creator>
      <dc:date>2008-01-28T20:27:08Z</dc:date>
    </item>
  </channel>
</rss>

