User guide

Management Commands AT8901M
AT8901M CLI Reference Manual Page 6 - 28
Access Retransmission
The number of RADIUS Access-Request packets retrans-
mitted to this RADIUS authentication server.
Access Accepts The number of RADIUS Access-Accept packets, including both
valid and invalid packets, which were received from this server.
Access Rejects The number of RADIUS Access-Reject packets, including both valid
and invalid packets, which were received from this server.
Access Challenges The number of RADIUS Access-Challenge packets, including
both valid and invalid packets, which were received from this server.
Malformed Access Responses The number of malformed RADIUS Access-
Response packets received from this server. Malformed packets
include packets with an invalid length. Bad authenticators or signature
attributes or unknown types are not included as malformed access
responses.
Bad Authenticators The number of RADIUS Access-Response packets containing
invalid authenticators or signature attributes received from this server.
Pending Requests The number of RADIUS Access-Request packets destined for this
server that have not yet timed out or received a response.
Timeouts The number of authentication timeouts to this server.
Unknown Types The number of RADIUS packets of unknown types, which were
received from this server on the authentication port.
Packets Dropped The number of RADIUS packets received from this server on the
authentication port and dropped for some other reason.
6.9 TACACS+ Commands
TACACS+ provides access control for networked devices via one or more centralized
servers. Similar to RADIUS, this protocol simplifies authentication by making use of a
single database that can be shared by many clients on a large network. TACACS+ is
based on the TACACS protocol (described in RFC1492) but additionally provides for
separate authentication, authorization, and accounting services. The original protocol
was UDP based with messages passed in clear text over the network; TACACS+ uses
TCP to ensure reliable delivery and a shared key configured on the client and daemon
server to encrypt all messages.
6.9.1 tacacs-server host
Use the tacacs-server host command in Global Configuration mode to configure a
TACACS+ server. This command enters into the TACACS+ configuration mode. The
<ip-address> parameter is the IP address of the TACACS+ server. To specify multiple
hosts, multiple
tacacs-server host commands can be used.
Format tacacs-server host <ip-address>
Mode Global Config
6.9.1.1 no tacacs-server host
Use the no tacacs-server host command to delete the specified hostname or IP
address. The <ip-address> parameter is the IP address of the TACACS+ server.
Format no tacacs-server host <ip-address>