Falcon R-Class | User Guide
99
Table 4-62: Authentication Method Configurations Parameters
Authentication Method Configuration
Client
The management client for which the configuration below applies.
Authentication
Methods
Authentication Method can be set to one of the following values:
•
No
: authentication is disabled, and login is not possible.
•
local
: use the local user database on the switch for authentication.
•
radius
: use a remote RADIUS server for authentication.
•
: use a remote server for authentication
Methods that involve remote servers are timed out if the remote servers are offline. In this case
the next method is tried. Each method is tried from left to right and continues until a method
either approves or rejects a user. If a remote server is used for primary authentication it is
recommended to configure secondary authentication as 'local'. This will enable the management
client to login via the local user database if none of the configured authentication servers are
alive.
Command Authorization Method Configuration
The command authorization section allows you to limit the CLI commands available to a user.
Client
The management client for which the configuration below applies.
Method
Method can be set to one of the following values:
•
no
: Command authorization is disabled. User is granted access to CLI
commands according to his privilege level.
•
tacacs
: Use remote server(s) for command authorization. If
all remote servers are offline, the user is granted access to CLI
commands according to his privilege level.
Cmd Lvl
Authorize all commands with a privilege level higher than or equal to this
level. Valid values are in the range of 0 to 15.
Cfg Cmd
Also authorize configuration commands.
Accounting Method Configuration
Client
The management client for which the configuration below applies.
Method
Method can be set to one of the following values:
•
no
: Accounting is disabled.
•
tacacs
: Use remote server(s) accounting.
Cmd Lvi
Enable accounting of all commands with a privilege level higher than or
equal to this level. Valid values are in the range 0 to 15. Leave the field
empty to disable command accounting.
Exec
Enable exec (login) accounting.
4.8.1.4
SSH Configuration
S
ecure
Sh
ell. It is a network protocol that allows data to be exchanged using a
secure channel between two networked devices. The encryption used by SSH provides confidentiality