
MES3000 Ethernet switch series
133
5.18
Control functions
5.18.1
AAA mechanism
To ensure the system security, the switch uses AAA mechanism (Authentication, Authorization,
Accounting).
Authentication—matching of the existing account in the security system.
Authorization (access level verification)—matching of the existing account in the system
(passed authentication) and specific privileges.
Accounting—user resource consumption monitoring.
SSH mechanism
is used for data encryption.
Global configuration mode commands
Command line request in global configuration mode appears as follows:
console(config)#
Table 5.143 —Global configuration mode commands
Command
Value/Default value
Action
aaa authentication login
{
default
|
list_name
}
method_list
By default, the local
database is used for
checking purposes (
aaa
authentication login
default local
);
list_name: (1..12)
characters
Define authentication method for log in.
-
default
—use the following authentication methods
-
list_name
—name of authentication method being activated
when the user logs in.
Method description (method1 [method2...]):
-
enable
—use password for authentication
- line
—use terminal password for authentication
-
local
—use local username database for authentication
-
none
—do not use authentication
-
radius
—use RADIUS server list for authentication
-
tacacs
—use TACACS server list for authentication
If authentication method is not defined, the
access to the console will always be successful.
List is created with the command:
aaa authentication login list-name method_list
List utilization:
aaa authentication login list-name
To prevent the loss of access, you should always
define the required minimum of settings for the
specified authentication method.
no aaa authentication login
{
default
|
list_name
}
Restore the default value.
aaa authentication mode
{chain | break}
-/chain
Sets the algorithm for polling of authentication methods.
-
сhain
— if authentication attempt performed with the first
method from the list is unsuccessful, subsequent authentication
attempt will use the next method in the chain.
-
break
—
if authentication attempt performed with the first
method from the list is unsuccessful, authentication process stops.