■
Use to allow privilege determination to be authenticated through the
or RADIUS server. This command specifies a list of authentication methods that
are used to determine whether a user is granted access to the privilege command
level.
■
The authentication methods that you can use in a list include these options:
radius
,
line
,
,
none
, and
enable
.
■
To specify that the authentication should succeed even if all methods return an
error, specify
none
as the final method in the command line.
■
Requests sent to a or RADIUS server include the username that is
entered for login authentication.
■
If the authentication method list is empty, the local
enable
password is used.
■
Example
host1(config)#
aaa authentication enable default radius
■
Use the
no
version to empty the list.
■
See aaa authentication enable default.
aaa authentication login
■
Use to set AAA authentication at login. This command creates a list that specifies
the methods of authentication.
■
After you have specified
aaa new-model
as the authentication method for vty
lines, an authentication list called default is automatically assigned to the vty
lines. To allow users to access the vty lines, you must create an authentication
list and either:
■
Name the list default.
■
Assign a different name to the authentication list, and assign the new list to
the vty line using the
login authentication
command.
■
The authentication methods that you can use in a list include these options:
radius
,
line
,
,
none
, and
enable
.
■
The system traverses the list of authentication methods to determine whether
a user is allowed to start a Telnet session. If a specific method is available but
the user information is not valid (such as an incorrect password), the system
does not continue to traverse the list and denies the user a session.
■
If a specific method is unavailable, the system continues to traverse the list. For
example, if
is the first authentication type element on the list and the
server is unreachable, the system attempts to authenticate with the
next authentication type on the list, such as
radius
.
■
The system assumes an implicit denial of service if it reaches the end of the
authentication list without finding an available method.
■
Example
host1(config)#
aaa authentication login my_auth_list radius line none
Vty Line Authentication and Authorization
■
431
Chapter 7: Passwords and Security
Содержание JUNOSe 11.1
Страница 6: ...vi...
Страница 8: ...viii JUNOSe 11 1 x System Basics Configuration Guide...
Страница 24: ...xxiv List of Figures JUNOSe 11 1 x System Basics Configuration Guide...
Страница 32: ...2 Chapters JUNOSe 11 1 x System Basics Configuration Guide...
Страница 58: ...28 Configuring Remote Access JUNOSe 11 1 x System Basics Configuration Guide...
Страница 176: ...146 Downgrading JUNOSe Software JUNOSe 11 1 x System Basics Configuration Guide...
Страница 280: ...250 Monitoring SNMP JUNOSe 11 1 x System Basics Configuration Guide...
Страница 384: ...354 Monitoring the System JUNOSe 11 1 x System Basics Configuration Guide...
Страница 446: ...416 Monitoring Modules JUNOSe 11 1 x System Basics Configuration Guide...
Страница 580: ...550 Monitoring Virtual Routers JUNOSe 11 1 x System Basics Configuration Guide...
Страница 581: ...Part 2 Reference Material Abbreviations and Acronyms on page 553 References on page 571 Reference Material 551...
Страница 582: ...552 Reference Material JUNOSe 11 1 x System Basics Configuration Guide...
Страница 622: ...592 Hardware Standards JUNOSe 11 1 x System Basics Configuration Guide...
Страница 623: ...Part 3 Index Index on page 595 Index 593...
Страница 624: ...594 Index JUNOSe 11 1 x System Basics Configuration Guide...
Страница 640: ...610 Index JUNOSe 11 1 x System Basics Configuration Guide...