Chapter 7
| Authentication Commands
Authentication Sequence
– 169 –
is attempted on the server. If the server is not available, the
local user name and password is checked.
Example
Console(config)#authentication enable radius
Console(config)#
Related Commands
enable password
- sets the password for changing command modes (
166
)
authentication login
This command defines the login authentication method and precedence. Use the
no
form to restore the default.
Syntax
authentication login
{[
local
] [
radius
] [
tacacs
]}
no authentication login
local
- Use local password.
radius
- Use RADIUS server password.
tacacs
- Use TACACS server password.
Default Setting
Local
Command Mode
Global Configuration
Command Usage
◆
RADIUS uses UDP while uses TCP. UDP only offers best effort delivery,
while TCP offers a connection-oriented transport. Also, note that RADIUS
encrypts only the password in the access-request packet from the client to the
server, while encrypts the entire body of the packet.
◆
RADIUS and logon authentication assigns a specific privilege level for
each user name and password pair. The user name, password, and privilege
level must be configured on the authentication server.
◆
You can specify three authentication methods in a single command to indicate
the authentication sequence. For example, if you enter “
authentication login
radius tacacs local
,” the user name and password on the RADIUS server is
verified first. If the RADIUS server is not available, then authentication is
attempted on the server. If the server is not available, the
local user name and password is checked.
Summary of Contents for EX-3524
Page 2: ......
Page 28: ...Figures 28 ...
Page 34: ...Section I Getting Started 34 ...
Page 58: ...Chapter 1 Initial Switch Configuration Setting the System Clock 58 ...
Page 72: ...Chapter 2 Using the Command Line Interface CLI Command Groups 72 ...
Page 156: ...Chapter 5 SNMP Commands Notification Log Commands 156 ...
Page 164: ...Chapter 6 Remote Monitoring Commands 164 ...
Page 218: ...Chapter 7 Authentication Commands Management IP Filter 218 ...
Page 268: ...Chapter 8 General Security Measures Port based Traffic Segmentation 268 ...
Page 292: ...Chapter 9 Access Control Lists ACL Information 292 ...
Page 312: ...Chapter 10 Interface Commands Power Savings 312 ...
Page 324: ...Chapter 11 Link Aggregation Commands Trunk Status Display Commands 324 ...
Page 366: ...Chapter 15 Address Table Commands 366 ...
Page 428: ...Chapter 17 VLAN Commands Configuring Voice VLANs 428 ...
Page 572: ...Chapter 25 IP Interface Commands IPv6 Interface 572 ...
Page 578: ...Section I Appendices 578 ...