User's Manual
13-28
Cisco IOS Software Configuration Guide for Cisco Aironet Access Points
OL-11350-01
Chapter 13 Configuring RADIUS and TACACS+ Servers
 Configuring and Enabling TACACS+
The aaa authorization exec tacacs+ local command sets these authorization parameters:
• Use TACACS+ for privileged EXEC access authorization if authentication was performed by using 
TACACS+.
• Use the local database if authentication was not performed by using TACACS+.
Note Authorization is bypassed for authenticated administrators who log in through the CLI even if 
authorization has been configured.
Beginning in privileged EXEC mode, follow these steps to specify TACACS+ authorization for 
privileged EXEC access and network services: 
To disable authorization, use the no aaa authorization {network | exec} method1 global configuration 
command. 
Starting TACACS+ Accounting
The AAA accounting feature tracks the services that administrators are accessing and the amount of 
network resources that they are consuming. When AAA accounting is enabled, the access point reports 
administrator activity to the TACACS+ security server in the form of accounting records. Each 
accounting record contains accounting attribute-value (AV) pairs and is stored on the security server. 
This data can then be analyzed for network management, client billing, or auditing.
Beginning in privileged EXEC mode, follow these steps to enable TACACS+ accounting for each Cisco 
IOS privilege level and for network services:
Command Purpose
Step 1
configure terminal Enter global configuration mode.
Step 2
aaa authorization network tacacs+ Configure the access point for administrator TACACS+ authorization for 
all network-related service requests.
Step 3
aaa authorization exec tacacs+ Configure the access point for administrator TACACS+ authorization to 
determine if the administrator has privileged EXEC access. 
The exec keyword might return user profile information (such as 
autocommand information). 
Step 4
end Return to privileged EXEC mode.
Step 5
show running-config Verify your entries.
Step 6
copy running-config startup-config (Optional) Save your entries in the configuration file.
Command Purpose
Step 1
configure terminal Enter global configuration mode.
Step 2
aaa accounting network start-stop 
tacacs+
Enable TACACS+ accounting for all network-related service requests. 
Step 3
aaa accounting exec start-stop tacacs+ Enable TACACS+ accounting to send a start-record accounting notice 
at the beginning of a privileged EXEC process and a stop-record at the 
end.
Step 4
end Return to privileged EXEC mode.










