aaa authentication enable
31
■
list-name
— Character string used to name the list of authentication
methods activated, when using access higher privilege levels. (Range:
1-12 characters)
■
method1
[
method2
...] — Specify at least one method from the
following list:
Default Configuration
I
If the
default
list is not set, only the enable password is checked. This has
the same effect as the command
aaa authentication enable
default
enable
.
On the console, the enable password is used if it exists. If no password is
set, the process still succeeds. This has the same effect as using the
command
aaa authentication enable
default enable none
.
Command Mode
Global Configuration mode
User Guidelines
The default and optional list names created with the
aaa authentication
enable
command are used with the
enable authentication
command.
The additional methods of authentication are used only if the previous
method returns an error, not if it fails. To ensure that the authentication
succeeds even if all methods return an error, specify
none
as the final
method in the command line.
All
aaa authentication enable
default
requests sent by the device to a
RADIUS or server include the username $enabx$., where x is
the requested privilege level.
Example
Keyword
Description
enableT
Uses the enable password for authentication.
line
Uses the line password for authentication.
none
Uses no authentication.
radius
Uses the list of all RADIUS servers for authentication.
Uses username $enabx$., where x is the privilege level.
tacacs
Uses the list of all servers for authentication.
Uses username "$enabx$." where x is the privilege level.
Summary of Contents for 3CRUS2475 24
Page 18: ......
Page 40: ...40 CHAPTER 2 AAA COMMANDS ...
Page 54: ...54 CHAPTER 3 ACL COMMANDS ...
Page 76: ...76 CHAPTER 4 ADDRESS TABLE COMMANDS ...
Page 166: ...166 CHAPTER 10 CLOCK COMMANDS ...
Page 200: ...200 CHAPTER 13 LACP COMMANDS ...
Page 208: ...208 CHAPTER 14 POWER OVER ETHERNET COMMANDS ...
Page 262: ...262 CHAPTER 15 SPANNING TREE COMMANDS ...
Page 278: ...278 CHAPTER 17 RADIUS COMMAND ...
Page 281: ...show ports monitor 281 g1 8 RX TX Active g2 8 RX TX Active g18 8 RX Active ...
Page 282: ...282 CHAPTER 18 PORT MONITOR COMMANDS ...
Page 306: ...306 CHAPTER 19 SNMP COMMANDS ...
Page 316: ...316 CHAPTER 20 IP ADDRESS COMMANDS ...
Page 330: ...330 CHAPTER 22 WIRELESS ROGUE AP COMMANDS ...
Page 350: ...350 CHAPTER 23 WIRELESS ESS COMMANDS ...
Page 382: ...382 CHAPTER 25 SSH COMMANDS ...
Page 400: ...400 CHAPTER 27 TACACS COMMANDS Global values TimeOut 3 ...
Page 444: ...444 CHAPTER 31 USER INTERFACE COMMANDS ...
Page 454: ...454 CHAPTER 32 GVRP COMMANDS ...
Page 492: ...492 CHAPTER 34 802 1X COMMANDS ...
Page 521: ...Troubleshooting Solutions 521 ...
Page 522: ...522 CHAPTER 37 TROUBLESHOOTING ...