To enable the AAA access control model, issue theaaa new-model global configuration command. Use the no form of this command to disable the AAA access control model.
aaa new-model
no aaa new-model
This command has no arguments or keywords.
AAA is not enabled.
Global configuration
Release | Modification | 10.0 | This command was introduced. |
---|
This command enables the AAA access control system. After you have enabled AAA, TACACS and extended TACACS commands are no longer available. If you initialize AAA functionality and later decide to use TACACS or extended TACACS, issue the no version of this command, and then enable the version of TACACS that you want to use.
The following example initializes AAA:
aaa new-model
Command | Description |
---|---|
aaa accounting | Enables AAA accounting of requested services for billing or security purposes. |
aaa authentication arap | Enables an AAA authentication method for ARA using TACACS+. |
aaa authentication enable default | Enables AAA authentication to determine if a user can access the privileged command level. |
aaa authentication local-override | Configures the Cisco IOS software to check the local user database for authentication before attempting another form of authentication. |
aaa authentication login | Sets AAA authentication at login. |
aaa authentication ppp | Specifies one or more AAA authentication method for use on serial interfaces running PPP. |
aaa authorization | Sets parameters that restrict network access to a user. |
Printed for apswan@ctr.ap.nic.in on Wed Mar 5 22:32:57 PST 2003
All material in this document copyright 2000 Cisco Systems, Inc. All rights reserved. No material may be reproduced or distributed without written permission of Cisco Systems, Inc.