![FoxGate S6124 Скачать руководство пользователя страница 37](http://html1.mh-extra.com/html/foxgate/s6124/s6124_command-manual_2325479037.webp)
37
the trusted IP address is not configured. After the trusted IP address is configured, only
clients with trusted IP addresses are able to login the switch. Up to 32 trusted IP
addresses can be configured in the switch.
Example:
To configure 192.168.1.21 as the trusted IP address.
Switch(config)# authentication securityip 192.168.1.21
1.2.5 authentication securityipv6
Command:
authentication securityipv6 <
ipv6-addr>
no authentication securityipv6 <
ipv6-addr>
Function:
To configure the trusted IPv6 address for Telnet and HTTP login method. The
no form of this command will remove the specified configuration.
Parameters: <
ipv6-addr>
is the trusted IPv6 address which can login the switch.
Default:
No trusted IPv6 addresses are configured by default.
Command Mode:
Global Mode.
Usage Guide:
IPv6 address of the client which can login the switch is not restricted before
the trusted IPv6 address is not configured. After the trusted IPv6 address is configured,
only clients with trusted IPv6 addresses are able to login the switch. Up to 32 trusted IPv6
addresses can be configured in the switch.
Example:
Configure the secure IPv6 address is 2001:da8:123:1::1.
Switch(config)# authentication securityipv6 2001:da8:123:1::1
1.2.6 authorization
Command: authorization line {console | vty | web} exec {local | radius | tacacs}
no authorization line {console | vty | web} exec
Function:
Configure VTY (login with Telnet and SSH), Web and Console, so as to select
the priority of the authorization mode for the login user. The no form command restores
the default authorization mode.
Default:
There is no authorization mode.
Command Mode:
Global Mode.
Usage Guide:
The authorization method for Console, VTY and Web login can be
configured respectively. And authorization method can be any one or combination of Local,
RADIUS or TACACS. When login method is configuration in combination, the preference
goes from left to right. If the users have passed the authorization method, authorization
method of lower preferences will be ignored. To be mentioned, if the user receives
Содержание S6124
Страница 311: ...311 Machine...
Страница 314: ...314...
Страница 318: ...318 am interface am ip pool 50 10 10 1 30 am mac ip pool 00 02 04 06 08 09 20 10 10 5 am ip pool 50 20 10 1 20...