![D-Link DES-3028 Скачать руководство пользователя страница 220](http://html.mh-extra.com/html/d-link/des-3028/des-3028_cli-reference-manual_77883220.webp)
DES-3028 DES-3028P DES-3028G DES-3052 DES-3052P Layer 2 Fast Ethernet Switch CLI Reference Manual
215
show authen_enable
Priority – Defines which order the method list protocols will be
queried for authentication when a user attempts to log on to the
Switch. Priority ranges from 1(highest) to 4 (lowest).
Method Name – Defines which security protocols are
implemented, per method list name.
Comment – Defines the type of Method.
User-defined Group
refers to
server groups
defined by the user.
Built-in Group
refers
to the TACACS, XTACACS, and RADIUS security
protocols which are permanently set in the Switch.
Keyword
refers
to authentication using a technique INSTEAD of
TACACS/XTACACS//RADIUS which are local
(authentication through the
local_enable
password on the Switch)
and none (no authentication necessary to access any function on
the Switch).
Restrictions None.
Example usage:
To display all method lists for promoting user level privileges to administrator level privileges.
DES-3028P:4#show authen_enable all
Command: show authen_enable all
Method List Name Priority Method Name Comment
---------------- -------- ------------- ------------------
Permit 1 Built-in Group
2 tacacs Built-in Group
3 Darren User-defined Group
4 local Keyword
default 1 Built-in Group
2 local Keyword
Total Entries : 2
DES-3028P:4#
config authen application
Purpose
Used to configure various applications on the Switch for
authentication using a previously configured method list.
Syntax
config authen application [console | telnet | ssh | http | all]
[login | enable] [default | method_list_name <string 15>]
Description
This command is used to configure Switch configuration
applications (console, telnet, ssh, web) for login at the user level
and at the administration level (
authen_enable
) utilizing a
previously configured method list.
Parameters
application
– Choose the application to configure. The user may
choose one of the following five options to configure.
console
– Choose this parameter to configure the
command line interface login method.
telnet
– Choose this parameter to configure the telnet
login method.
ssh
– Choose this parameter to configure the Secure