
Chapter 7
| Authentication Commands
Authentication Sequence
– 215 –
Command Usage
◆
RADIUS uses UDP while uses TCP. UDP only offers best effort delivery,
while TCP offers a connection-oriented transport. Also, note that RADIUS
encrypts only the password in the access-request packet from the client to the
server, while encrypts the entire body of the packet.
◆
RADIUS and logon authentication assigns a specific privilege level for
each user name and password pair. The user name, password, and privilege
level must be configured on the authentication server.
◆
You can specify three authentication methods in a single command to indicate
the authentication sequence. For example, if you enter “
authentication
enable radius tacacs local
,” the user name and password on the RADIUS
server is verified first. If the RADIUS server is not available, then authentication
is attempted on the server. If the server is not available, the
local user name and password is checked.
Example
Console(config)#authentication enable radius
Console(config)#
Related Commands
- sets the password for changing command modes (
)
authentication login
This command defines the login authentication method and precedence. Use the
no
form to restore the default.
Syntax
authentication login
{[
local
] [
radius
] [
tacacs
]}
no authentication login
local
- Use local password.
radius
- Use RADIUS server password.
tacacs
- Use TACACS server password.
Default Setting
Local
Command Mode
Global Configuration
Command Usage
◆
RADIUS uses UDP while uses TCP. UDP only offers best effort delivery,
while TCP offers a connection-oriented transport. Also, note that RADIUS
encrypts only the password in the access-request packet from the client to the
server, while encrypts the entire body of the packet.
Summary of Contents for AS5700-54X
Page 42: ...Contents 42...
Page 44: ...Figures 44...
Page 52: ...Tables 52...
Page 54: ...Section I Getting Started 54...
Page 80: ...Chapter 1 Initial Switch Configuration Setting the System Clock 80...
Page 210: ...Chapter 6 Remote Monitoring Commands 210...
Page 358: ...Chapter 9 Access Control Lists ACL Information 358...
Page 418: ...Chapter 12 Port Mirroring Commands RSPAN Mirroring Commands 418...
Page 436: ...Chapter 15 UniDirectional Link Detection Commands 436...
Page 442: ...Chapter 16 Address Table Commands 442...
Page 506: ...Chapter 18 VLAN Commands Configuring VXLAN Tunneling 506...
Page 526: ...Chapter 19 Class of Service Commands Priority Commands Layer 3 and 4 526...
Page 544: ...Chapter 20 Quality of Service Commands 544...
Page 652: ...Chapter 22 Multicast Filtering Commands MLD Proxy Routing 652...
Page 680: ...Chapter 23 LLDP Commands 680...
Page 722: ...Chapter 24 CFM Commands Delay Measure Operations 722...
Page 732: ...Chapter 25 Domain Name Service Commands 732...
Page 790: ...Chapter 27 IP Interface Commands ND Snooping 790...
Page 1072: ...Section III Appendices 1072...
Page 1102: ...List of CLI Commands 1102...
Page 1115: ......
Page 1116: ...AS5700 54X AS6700 32X E032016 ST R02 149100000198A...