xStack
®
DGS-3400 Series Layer 2 Gigabit Managed Switch CLI Manual
265
D G S – 3 4 2 6 : 5 # s h o w a u t h e n _ p o l i c y
C o m m a n d : s h o w a u t h e n _ p o l i c y
A u t h e n t i c a t i o n P o l i c y : E n a b l e d
D G S – 3 4 2 6 : 5 #
create authen_login method_list_name
Purpose
Used to create a user defined method list of authentication methods for users logging on
to the Switch.
Syntax
create authen_login method_list_name <string 15>
Description
This command is used to create a list for authentication techniques for user login. The
Switch can support up to eight method lists, but one is reserved as a default and cannot
be deleted. Multiple method lists must be created and configured separately.
Parameters
<string 15>
– Enter an alphanumeric string of up to 15 characters to define the given
method list
.
Restrictions
Only Administrator-level users can issue this command.
Example usage:
To create the method list “Tiberius.”:
D G S – 3 4 2 6 : 5 # c r e a t e a u t h e n _ l o g i n m e t h o d _ l i s t _ n a m e T i b e r i u s
C o m m a n d : c r e a t e a u t h e n _ l o g i n m e t h o d _ l i s t _ n a m e T i b e r i u s
S u c c e s s .
D G S – 3 4 2 6 : 5 #
config authen_login
Purpose
Used to configure a user–defined or default method list of authentication methods for user
login.
Syntax
config authen_login [default | method_list_name <string 15>] method {tacacs |
xtacacs | | radius | server_group <string 15> | local | none} (1)
Description
This command is used to configure a user–defined or default method list of authentication
methods for users logging on to the Switch. The sequence of methods implemented in
this command will affect the authentication result. For example, if a user enters a
sequence of methods like
tacacs – xtacacs – local,
the Switch will send an authentication
request to the first
tacacs
host in the server group. If no response comes from the server
host, the Switch will send an authentication request to the second
tacacs
host in the
server group and so on, until the list is exhausted. At that point, the Switch will restart the
same sequence with the following protocol listed,
xtacacs
. If no authentication takes place
using the
xtacacs
list, the
local
account database set in the Switch is used to authenticate
the user. When the local method is used, the privilege level will be dependant on the local
account privilege configured on the Switch.
Successful login using any of these methods will give the user a “user” privilege only. If
the user wishes to upgrade his or her status to the administrator level, the user must
implement the
enable admin
command, followed by a previously configured password.
(
See the enable admin part of this section for more detailed information, concerning the
enable admin command.)
Parameters
default
– The default method list for access authentication, as defined by the user. The
user may choose one or a combination of up to four of the following authentication
methods:
tacacs
– Adding this parameter will require the user to be authenticated using