4-11
Authentication
Configuring on the Switch
Configuring the Switch’s Authentication
Methods
The
aaa authentication
command configures access control for the
following access methods:
■
Console
■
Telnet
■
SSH
The command specifies whether to use a server or the switch’s local
authentication, or no authentication in some situations (meaning that if the
primary method fails, authentication is denied). The command also reconfig-
ures the number of access attempts to allow in a session if the first attempt
uses an incorrect username/password pair.
Syntax:
aaa authentication
< console | telnet | ssh >
Selects the access method for configuration.
< enable | login>
<primary-method
> <
backup-method
>
enable
—
Configures "enable" privilege level (read/
write) access for the authentication method
.
login
—
Configures "login" privilege level (read-only)
access for the authentication method.
<primary-method
> —
The primary authentication method
for access.
<
backup-method
> —
The authentication method to use if
the primary method is not able to check the user’s
credentials.
<
login privilege-mode >
Enables for single login. The switch
authenticates your username/password, then requests
the privilege level (Operator orManager) that was
configured on the server for this username/
password. The server returns the allowed
privilege level to the switch. You are placed directly into
Operator or Manager mode, depending on your privilege
level.
Default: Single login disabled.
Содержание ProCurve 2510-24
Страница 1: ...Access Security Guide 2510 www procurve com ProCurve Switches Q 11 XX 2510 24 U 11 XX 2510 48 ...
Страница 2: ......
Страница 3: ...ProCurve Series 2510 Switches Access Security Guide July 2008 ...
Страница 26: ...1 10 Getting Started Need Only a Quick Start ...
Страница 104: ...4 30 TACACS Authentication Configuring TACACS on the Switch ...
Страница 144: ...5 40 RADIUS Authentication Authorization and Accounting Messages Related to RADIUS Operation ...
Страница 174: ...6 30 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Страница 196: ...7 22 Configuring Secure Socket Layer SSL Common Errors in SSL Setup ...
Страница 294: ...9 40 Configuring and Monitoring Port Security Configuring Protected Ports ...
Страница 308: ...10 14 Using Authorized IP Managers Operating Notes ...
Страница 316: ...8 Index ...
Страница 317: ......