|
|
- #
- # An example tac_plus configuration. You should change this
- # before using it.
- #
-
- # Define where to log accounting data, this is the default.
- accounting file = /var/log/tac_plus.acct
-
- # This is the key that clients have to use to access Tacacs+
- key = testing123
-
- # Use /etc/passwd file to do authentication
- #default authentication = file /etc/passwd
-
- # You can use feature like per host key with different enable passwords
- #host = 127.0.0.1 {
- # key = test
- # type = cisco
- # enable = <des|cleartext> enablepass
- # prompt = "Welcome XXX ISP Access Router \n\nUsername:"
- #}
-
- # We also can define local users and specify a file where data is stored.
- # That file may be filled using tac_pwd
- #user = test1 {
- # name = "Test User"
- # member = staff
- # login = file /etc/tacacs/tacacs_passwords
- #}
-
- # We can also specify rules valid per group of users.
- #group = group1 {
- # cmd = conf {
- # deny
- # }
- #}
-
- # Another example : forbid configure command for some hosts
- # for a define range of clients
- #group = group1 {
- # login = file /etc/passwd
- # service = ppp
- # protocol = ip {
- # addr = 10.10.0.0/24
- # }
- # cmd = conf {
- # deny .*
- # }
- #}
-
- user = DEFAULT {
- login = file /etc/passwd
- service = ppp protocol = ip {}
- }
-
- # Much more features are availables, like ACL, more service compatibilities,
- # commands authorization, scripting authorization.
- # See the man page for those features.
|