
Chapter 3: Management Commands
55
will not get access to Privileged EXEC mode. On the other hand, with default
conditions, a console user always enter the Privileged EXEC mode without
entering the enable password.
The default and optional list names created with the
aaa authentication
enable
command are used with the
enable authentication
command. Create a
list by entering the
aaa authentication enable list-name method
command
where
list-name
is any character string used to name this list. The
method
argument identifies the list of methods that the authentication algorithm tries in
the given sequence.
The user manager returns ERROR (not PASS or FAIL) for enable and line
methods if no password is configured, and moves to the next configured method
in the authentication list. The method
none
reflects that there is no authentication
needed.
The user will only be prompted for an enable password if one is required. The
following authentication methods do not require passwords:
1.
none
2.
deny
3.
enable (if no enable password is configured)
4.
line (if no line password is configured)
See the examples below.
◆
aaa authentication enable default enable none
◆
aaa authentication enable default line none
◆
aaa authentication enable default enable radius none
◆
aaa authentication enable default line tacacs none
The first two examples do not prompt for a password; however, because the last
two examples contain the
radius
and
tacacs
methods, the password prompt is
displayed.
If the login methods include only enable, and there is no enable password
configured, then CN1610 does not prompt for a username. In such cases,
CN1610 only prompts for a password. CN1610 supports configuring methods
after the local method in authentication and authorization lists. If the user is not
present in the local database, then the next configured method is tried.
The additional methods of authentication are used only if the previous method
returns an error, not if it fails. To ensure that the authentication succeeds even if
all methods return an error, specify
none
as the final method in the command line.
Содержание CN1610
Страница 3: ......
Страница 27: ...24 CLI Line Editing Conventions List available commands keywords or parameters Key Sequence Description ...
Страница 31: ...28 Accessing the CLI ...
Страница 309: ...306 Remote Monitoring Commands ...
Страница 473: ...470 Port Mirroring Commands 100 ...
Страница 487: ...484 DHCP L2 Relay Agent Commands Mode Privileged EXEC ...
Страница 607: ...604 IPv6 Management Commands ...