12 ContentsManaging the Stack (CLI) . . . . . . . . . . . . . . . 192Configuring Stack Member, Stack Port, andNSF Settings . . . . . . . . . . . . . . . . . . . 192Viewing and Clearing Stacking and NSFInformation . . . . . . . . . . . . . . . . . . . . 194Stacking and NSF Usage Scenarios . . . . . . . . . . 195Basic Failover . . . . . . . . . . . . . . . . . . . 195Preconfiguring a Stack Member . . . . . . . . . 197NSF in the Data Center . . . . . . . . . . . . . . 199NSF and VoIP . . . . . . . . . . . . . . . . . . . 200NSF and DHCP Snooping . . . . . . . . . . . . . 201NSF and the Storage Access Network . . . . . . 202NSF and Routed Access . . . . . . . . . . . . . 20410 Configuring Authentication,Authorization, and Accounting . . . . . . . 207AAA Overview . . . . . . . . . . . . . . . . . . . . . 207Methods. . . . . . . . . . . . . . . . . . . . . . 208Access Lines . . . . . . . . . . . . . . . . . . . 209Authentication . . . . . . . . . . . . . . . . . . . . . 211Authentication Types . . . . . . . . . . . . . . . 211Authorization . . . . . . . . . . . . . . . . . . . . . . 212Exec Authorization Capabilities. . . . . . . . . . 212Accounting . . . . . . . . . . . . . . . . . . . . . . . 214Authentication Examples . . . . . . . . . . . . . . . 215Local Authentication Example . . . . . . . . . . 215TACACS+ Authentication Example . . . . . . . . 217Public Key SSH Authentication Example . . . . . 218RADIUS Authentication Example . . . . . . . . . 225