Version Description7.6.1.0 Introduced on the S-Series.7.5.1.0 Introduced on the C-Series.6.1.1.0 Added support for RADIUS.Usage Information Certain TACACS+ servers do not authenticate the device if you use the aaa authorization commandslevel default local tacacs+ command. To resolve the issue, use the aaa authorizationcommands level default tacacs+ local command.aaa authorization config-commandsSet parameters that restrict (or permit) a user’s access to EXEC level commands.Syntax aaa authorization config-commandsDisable authorization checking for CONFIGURATION level commands using the no aaa authorizationconfig-commands command.Defaults Enabled when you configure aaa authorization commands command.Command Modes CONFIGURATIONCommand History This guide is platform-specific. For command information about other platforms, see the relevant Dell NetworkingOS Command Line Reference Guide.Version Description9.10(0.0) Introduced on the S6100-ON.9.8(1.0) Introduced on the Z9100-ON.9.8(0.0P5) Introduced on the S4048-ON.9.8(0.0P2) Introduced on the S3048-ON.9.7(0.0) Introduced on the S6000–ON.9.2(1.0) Introduced on the Z9500.9.0.2.0 Introduced on the S6000.8.3.19.0 Introduced on the S4820T.8.3.11.1 Introduced on the Z9000.8.3.7.0 Introduced on the S4810.7.6.1.0 Introduced on the S-Series.7.5.1.0 Introduced on the E-Series.Usage Information By default, the aaa authorization commands command configures the system to check both EXEC leveland CONFIGURATION level commands. Use the command no aaa authorization config-commands toenable only EXEC-level command checking.Security 1383