xStack
®
DGS-3400 Series Layer 2 Gigabit Ethernet Managed Switch CLI Manual
45
Please note that user granted access to the Switch will be granted normal user privileges on the Switch. To gain access
to admin level privileges, the user must enter the
enable admin
command and then enter a password, which was
previously configured by the administrator of the Switch.
The Access Authentication Control commands in the Command Line Interface (CLI) are listed (along with the appropriate
parameters) in the following table.
Command
Parameters
enable password encryption
disable password encryption
create account
[admin | operator | user] <username 15>
config account
<username> {encrypt [plain_text | sha_1] <password>}
show account
delete account
<username>
enable authen_policy
disable authen_policy
show authen_policy
create authen_login
method_list_name
<string 15>
config authen_login
[default | method_list_name <string 15>] method {tacacs | xtacacs | |
radius | server_group <string 15> | local | none}
delete authen_login
method_list_name
<string 15>
show authen_login
[default | method_list_name <string 15> | all]
create authen_enable
method_list_name
<string 15>
config authen_enable
[default | method_list_name <string 15>] method {tacacs | xtacacs | |
radius | server_group <string 15> | local _enable | none}
delete authen_enable
method_list_name
<string 15>
show authen_enable
[default | method_list_name <string 15> | all]
config authen application
[console | telnet | ssh | http | all] [login | enable] [default | method_list_name
<string 15>]
show authen application
create authen server_group
<string 15>
config authen server_group
[tacacs | xtacacs | | radius | <string 15>] [add | delete] server_host
<ipaddr> protocol [tacacs | xtacacs | | radius]
delete authen server_group
<string 15>
show authen server_group
{<string 15>}
create authen server_host
<ipaddr> protocol [tacacs | xtacacs | | radius] {port <int 1-65535> | [key
[<key_string 254> | none] | encryption_key <key_string 344>] | timeout <int 1-
255> | retransmit <int 1-20>}
NOTE:
TACACS, XTACACS and are separate entities and are not compatible. The Switch
and the server must be configured exactly the same, using the same protocol. (For example, if the
Switch is set up for TACACS authentication, so must be the host server.)