DGS-1510 Series Gigabit Ethernet SmartPro Switch CLI Reference Guide
94
Switch#configure terminal
Switch(config)#aaa authentication jwac default group radius
Switch(config)#
8-8 aaa authentication login
This command is used to configure the method list used for login authentication. Use the
no
form of
this command to remove a login method list.
aaa authentication login {default |
LIST-NAME
}
METHOD1
[
METHOD2...
]
no aaa authentication login {default |
LIST-NAME
}
Parameters
default
Specifies to configure the default method list for login
authentication.
LIST-NAME
Specifies the name of the method list other than the default method
list. This name can be up to 32 characters long.
METHOD1
[
METHOD2...
]
Specifies the list of methods that the authentication algorithm tries
in the given sequence. Enter at least one method or enter up to four
methods. The following are keywords that can be used to specify a
method.
local
– Specifies to use the local database for authentication.
group radius
– Specifies to use the servers defined by the RADIUS
server host command.
group
- Specifies to use the servers defined by the
server host command.
group
GROUP-NAME
– Specifies to use the server groups defined
by the AAA group server command.
none
- Normally, the method is listed as the last method. The user
will pass authentication if it is not denied by previous method’s
authentication.
Default
No AAA authentication method list is configured.
Command Mode
Global Configuration Mode.
Command Default Level
Level: 15.
Usage Guideline
Use this command to configure the authentication method list used for login authentication. Multiple
method lists can be configured. The default keyword is used to define the default method list.
If authentication uses the default method list but the default method list does not exist, then the
authentication will be performed via the local database.
The login authentication authenticates the login user name and password, and also assigns the
privilege level to the user based on the database.
A method list is a sequential list describing the authentication methods to be queried in order to
authenticate a user. Method lists enable you to designate one or more security protocols to be used
for authentication, thus ensuring a backup system for authentication in case the initial method fails.
The switch system uses the first listed method to authenticate users. If that method fails to respond,
the switch system selects the next authentication method listed in the method list. This process
Summary of Contents for DGS-1510 Series
Page 1: ...1 0 ...
Page 27: ...DGS 1510 Series Gigabit Ethernet SmartPro Switch CLI Reference Guide 24 ...
Page 281: ...DGS 1510 Series Gigabit Ethernet SmartPro Switch CLI Reference Guide 278 ...
Page 336: ...DGS 1510 Series Gigabit Ethernet SmartPro Switch CLI Reference Guide 333 ...
Page 475: ...DGS 1510 Series Gigabit Ethernet SmartPro Switch CLI Reference Guide 472 ...
Page 695: ...DGS 1510 Series Gigabit Ethernet SmartPro Switch CLI Reference Guide 692 ...