Using TACACS to control CW2K logins. Looking for documentation on configuring TACACS to control priv levels for CW2K based on login name. Does using TACACS login module to get into CW2K enable the audit trail to track actions done by the user?
Also looking for addtional documentation on using the AD login module.
What I am looking for is the best login path to CW2K that will enable me to audit what switch and router actions the user has accomplished while loggend into CW2K.