User Authentication Commands
25-4
25
Authentication Sequence
Three authentication methods can be specified to authenticate users logging into the
system for management access. The commands in this section can be used to
define the authentication method and sequence.
authentication login
This command defines the login authentication method and precedence. Use the
no
form to restore the default.
Syntax
authentication login
{[
local
] [
radius
] [
tacacs
]}
no authentication login
•
local
- Use local password.
•
radius
- Use RADIUS server password.
•
tacacs
- Use TACACS server password.
Default Setting
Local
Command Mode
Global Configuration
Command Usage
• RADIUS uses UDP while uses TCP. UDP only offers best effort
delivery, while TCP offers a connection-oriented transport. Also, note that
RADIUS encrypts only the password in the access-request packet from the
client to the server, while encrypts the entire body of the packet.
• RADIUS and logon authentication assigns a specific privilege level
for each user name and password pair. The user name, password, and
privilege level must be configured on the authentication server.
• You can specify three authentication methods in a single command to indicate
the authentication sequence. For example, if you enter “
authentication login
radius tacacs local
,” the user name and password on the RADIUS server is
verified first. If the RADIUS server is not available, then authentication is
attempted on the server. If the server is not available,
the local user name and password is checked.
Table 25-4 Authentication Sequence Commands
Command
Function
Mode
Page
authentication login
Defines logon authentication method and precedence
GC
25-4
authentication enable
Defines the authentication method and precedence for
command mode change
GC
25-5
Summary of Contents for ES4626F
Page 2: ......
Page 4: ...ES4626F ES4650F F1 1 0 2 E062009 R01 ST 149100000013A...
Page 6: ...ii...
Page 34: ...Getting Started...
Page 44: ...Introduction 1 10 1...
Page 62: ...Initial Configuration 2 18 2...
Page 64: ...Switch Management...
Page 76: ...Configuring the Switch 3 12 3...
Page 118: ...Basic Management Tasks 4 42 4...
Page 164: ...User Authentication 6 28 6...
Page 176: ...Access Control Lists 7 12 7...
Page 284: ...Quality of Service 14 8 14...
Page 294: ...Multicast Filtering 15 10 15...
Page 300: ...Domain Name Service 16 6 16...
Page 310: ...Dynamic Host Configuration Protocol 17 10 17...
Page 320: ...Configuring Router Redundancy 18 10 18...
Page 344: ...IP Routing 19 24 19...
Page 356: ...Unicast Routing 20 12 20 Web Click Routing Protocol RIP Statistics Figure 20 5 RIP Statistics...
Page 386: ...Unicast Routing 20 42 20...
Page 388: ...Command Line Interface...
Page 400: ...Overview of the Command Line Interface 21 12 21...
Page 466: ...SNMP Commands 24 16 24...
Page 520: ...Access Control List Commands 26 18 26...
Page 546: ...Rate Limit Commands 30 2 30...
Page 612: ...VLAN Commands 34 24 34...
Page 626: ...Class of Service Commands 35 14 35...
Page 670: ...DHCP Commands 39 16 39...
Page 716: ...IP Interface Commands 41 36 41...
Page 768: ...IP Routing Commands 42 52 42...
Page 770: ...Appendices...
Page 791: ......
Page 792: ...ES4626F ES4650F E062009 R01 ST 149100000013A...