xStack
®
DGS-3400 Series Layer 2 Gigabit Managed Switch CLI Manual
267
D G S – 3 4 2 6 : 5 # c o n f i g a u t h e n _ l o g i n d e f a u l t m e t h o d x t a c a c s t a c a c s + l o c a l
C o m m a n d : c o n f i g a u t h e n _ l o g i n d e f a u l t m e t h o d x t a c a c s t a c a c s + l o c a l
S u c c e s s .
D G S – 3 4 2 6 : 5 #
delete authen_login method_list_name
Purpose
Used to delete a previously configured user defined method list of authentication methods
for users logging on to the Switch.
Syntax
delete authen_login method_list_name <string 15>
Description
This command is used to delete a list for authentication methods for user login.
Parameters
<string 15>
– Enter an alphanumeric string of up to 15 characters to define the given
method list
to delete.
Restrictions
Only Administrator-level users can issue this command.
Example usage:
To delete the method list name “Tiberius”:
D G S – 3 4 2 6 : 5 # d e l e t e a u t h e n _ l o g i n m e t h o d _ l i s t _ n a m e T i b e r i u s
C o m m a n d : d e l e t e a u t h e n _ l o g i n m e t h o d _ l i s t _ n a m e T i b e r i u s
S u c c e s s .
D G S – 3 4 2 6 : 5 #
show authen_login
Purpose
Used to display a previously configured user defined method list of authentication
methods for users logging on to the Switch.
Syntax
show authen_login [default | method_list_name <string 15> | all]
Description
This command is used to show a list of authentication methods for user login.
Parameters
default
– Entering this parameter will display the default method list for users logging on
to the Switch.
method_list_name <string 15>
– Enter an alphanumeric string of up to 15 characters to
define the given
method list
the user wishes to view.
all
– Entering this parameter will display all the authentication login methods currently
configured on the Switch.
The window will display the following parameters:
Method List Name – The name of a previously configured method list name.
Priority – Defines which order the method list protocols will be queried for
authentication when a user attempts to log on to the Switch. Priority ranges from
1(highest) to 4 (lowest).
Method Name – Defines which security protocols are implemented, per method
list name.
Comment – Defines the type of Method.
User–defined Group
refers to server
group defined by the user.
Built–in Group
refers to the TACACS, XTACACS,
and RADIUS security protocols which are permanently set in the
Switch.
Keyword
refers to authentication using a technique INSTEAD of
TACACS / XTACACS / / RADIUS which are local (authentication
through the user account on the Switch) and none (no authentication necessary
to access any function on the Switch).
Restrictions
Only Administrator-level users can issue this command.