Security Commands
866
• method1 [method2...] — Specify at least one from the following table:
Default Configuration
The local user database is checked. This action has the same effect as the
command
ip http authentication local
.
Command Mode
Global Configuration mode
User Guidelines
The additional methods of authentication are used only if the previous
method returns an error, not if it fails. To ensure that the authentication
succeeds even if all methods return an error, specify
none
as the final method
in the command line. For example, if
none
is specified as an authentication
method after
radius
, no authentication is used if the RADIUS server is down.
Example
The following example configures the http authentication.
console(config)# ip http authentication radius local
ip https authentication
Use the
ip https authentication
command in Global Configuration mode to
specify authentication methods for users authenticating over HTTPS. To
return to the default configuration, use the
no
form of this command.
Syntax
ip https authentication
method1 [method2...]
no ip https authentication
Keyword
Source or destination
local
Uses the local username database for authentication.
none
Uses no authentication.
radius
Uses the list of all RADIUS servers for authentication.
tacacs
Uses the list of all servers for authentication.
Summary of Contents for N1100-ON
Page 2: ......
Page 4: ......
Page 258: ...Using the CLI 258 ...
Page 488: ...Layer 2 Switching Commands 488 Operational State Querier Operational version 1 ...
Page 656: ...Layer 2 Switching Commands 656 10 ...
Page 1128: ...Audio Visual Bridging Commands 1128 ...
Page 1186: ...Data Center Technology Commands 1186 ...
Page 1435: ...Layer 3 Routing Commands 1435 Number of Joins 7 Number of Groups 1 ...
Page 2330: ......
Page 2331: ...www dell com support dell com Printed in the U S A ...
Page 2332: ......