3.
(Optional) Specify the privilege level by defining a method list for authentication.
host1(config)
aaa authentication enable default radius enable
4.
(Optional) Enable authorization, and create an authorization method list.
host1(config)
aaa authorization commands 15 boston if-authenticated
5.
(Optional) Disable authorization for all Global Configuration commands.
host1(config)#
no aaa authorization config-commands
6.
Specify the range of vty lines.
host1(config)#
line vty 6 10
host1(config-line)#
7.
(Optional) Apply an authorization list to a vty line or a range of vty lines.
host1(config-line)#
authorization commands 15 boston
8.
Specify the password for the vty lines.
host1(config-line)#
password xyz
9.
Apply the authentication list to the vty lines you specified on your router.
host1(config-line)#
login authentication my_auth_list
aaa authentication enable default
•
Use to allow privilege determination to be authenticated through the or
RADIUS server. This command specifies a list of authentication methods that are used
to determine whether a user is granted access to the privilege command level.
•
The authentication methods that you can use in a list include these options:
radius
,
line
,
,
none
, and
enable
.
•
To specify that the authentication should succeed even if all methods return an error,
specify
none
as the final method in the command line.
•
Requests sent to a or RADIUS server include the username that is entered
for login authentication.
•
If the authentication method list is empty, the local
enable
password is used.
•
Example
host1(config)#
aaa authentication enable default radius
•
Use the
no
version to empty the list.
•
See aaa authentication enable default.
aaa authentication login
•
Use to set AAA authentication at login. This command creates a list that specifies the
methods of authentication.
•
After you have specified
aaa new-model
as the authentication method for vty lines,
an authentication list called default is automatically assigned to the vty lines. To allow
users to access the vty lines, you must create an authentication list and either:
Copyright © 2010, Juniper Networks, Inc.
416
JunosE 11.3.x System Basics Configuration Guide
Summary of Contents for JUNOSE 11.3
Page 6: ...Copyright 2010 Juniper Networks Inc vi...
Page 8: ...Copyright 2010 Juniper Networks Inc viii JunosE 11 3 x System Basics Configuration Guide...
Page 24: ...Copyright 2010 Juniper Networks Inc xxiv JunosE 11 3 x System Basics Configuration Guide...
Page 32: ...Copyright 2010 Juniper Networks Inc 2 JunosE 11 3 x System Basics Configuration Guide...
Page 146: ...Copyright 2010 Juniper Networks Inc 116 JunosE 11 3 x System Basics Configuration Guide...
Page 166: ...Copyright 2010 Juniper Networks Inc 136 JunosE 11 3 x System Basics Configuration Guide...
Page 432: ...Copyright 2010 Juniper Networks Inc 402 JunosE 11 3 x System Basics Configuration Guide...
Page 488: ...Copyright 2010 Juniper Networks Inc 458 JunosE 11 3 x System Basics Configuration Guide...
Page 524: ...Copyright 2010 Juniper Networks Inc 494 JunosE 11 3 x System Basics Configuration Guide...
Page 554: ...Copyright 2010 Juniper Networks Inc 524 JunosE 11 3 x System Basics Configuration Guide...
Page 566: ...Copyright 2010 Juniper Networks Inc 536 JunosE 11 3 x System Basics Configuration Guide...
Page 588: ...Copyright 2010 Juniper Networks Inc 558 JunosE 11 3 x System Basics Configuration Guide...
Page 613: ...PART 3 Index Index on page 585 583 Copyright 2010 Juniper Networks Inc...
Page 614: ...Copyright 2010 Juniper Networks Inc 584 JunosE 11 3 x System Basics Configuration Guide...
Page 632: ...Copyright 2010 Juniper Networks Inc 602 JunosE 11 3 x System Basics Configuration Guide...