xStack DES-3800 Series Layer 3 Stackable Fast Ethernet Managed Switch CLI Manual
267
delete authen_enable method_list_name
Purpose
Used to delete a user-defined method list of authentication methods
for promoting normal user level privileges to Administrator level
privileges on the Switch.
Syntax
delete authen_enable method_list_name <string 15>
Description
This command is used to delete a user-defined method list of
authentication methods for promoting user level privileges to
Adminstrator level privileges.
Parameters
<string 15>
- Enter an alphanumeric string of up to 15 characters to
define the given
enable method list
the user wishes to delete.
Restrictions Only
administrator-level users can issue this command.
Example usage:
To delete the user-defined method list “Permit”
DES-3800:4#delete authen_enable method_list_name Permit
Command: delete authen_enable method_list_name Permit
Success.
DES-3800:4#
show authen_enable
Purpose
Used to display the method list of authentication methods for promoting normal
user level privileges to Administrator level privileges on the Switch.
Syntax
show authen_enable [default | method_list_name <string 15> | all]
Description
This command is used to delete a user-defined method list of authentication
methods for promoting user level privileges to Adminstrator level privileges.
Parameters
default
– Entering this parameter will display the default method list for users
attempting to gain access to Administrator level privileges on the Switch.
method_list_name <string 15>
- Enter an alphanumeric string of up to 15
characters to define the given
method list
the user wishes to view.
all – Entering this parameter will display all the authentication login methods
currently configured on the Switch.
The window will display the following parameters:
Method List Name – The name of a previously configured method list
name.
Priority – Defines which order the method list protocols will be queried
for authentication when a user attempts to log on to the Switch. Priority
ranges from 1(highest) to 4 (lowest).
Method Name – Defines which security protocols are implemeted, per
method list name.
Comment – Defines the type of Method.
User-defined Group
refers to
server groups
defined by the user.
Built-in Group
refers to the
TACACS, XTACACS, and RADIUS security protocols which
are permanently set in the Switch.
Keyword
refers to authentication
using a technique INSTEAD of