Concept Guide

Command Modes CONFIGURATION
Supported Modes Full–Switch
Command History
Version Description
9.9(0.0) Introduced on the FN IOM.
9.7(0.0) Introduced on the S6000-ON.
9.5(0.0) Introduced on the Z9000, S6000, S4820T, S4810, and MXL.
Usage Information
By default, access to commands are determined by the user’s role (if dened) or by the user’s privilege level. If the
aaa authorization role-only command is enabled, then only the user’s role is used.
Before you enable role-based only AAA authorization:
1 Locally dene a system administrator user role.This will give you access to login with full permissions even if
network connectivity to remote authentication servers is not available.
2 Congure login authentication on the console. This ensures that all users are properly identied through
authentication no matter the access point
3 Specify an authentication method (RADIUS, TACACS+, or Local).
4 Specify authorization method (RADIUS, TACACS+ or Local).
5 Verify the conguration has been applied to the console or VTY line.
Related Commands login authentication, password, radius-server host, tacacs-server host
aaa authorization cong-commands
Set parameters that restrict (or permit) a user’s access to EXEC level commands.
Syntax
aaa authorization config-commands
Disable authorization checking for CONFIGURATION level commands using the no aaa authorization
config-commands command.
Defaults Enabled when you congure aaa authorization commands command.
Command Modes CONFIGURATION
Supported Modes All Modes.
Command History
Version Description
9.9(0.0) Introduced on the FN IOM.
8.3.16.1 Introduced on the MXL 10/40GbE Switch IO Module.
Usage Information By default, the aaa authorization commands command congures the system to check both EXEC level
and CONFIGURATION level commands. To enable only EXEC-level command checking, use the command no
aaa authorization config-commands
. role method is supported only on Full-Switch mode.
1152 Security