Authentication Commands; Authentication Sequence; Table 4-27 Authentication Commands; Table 4-28 Authentication Sequence - SMC Networks SMC8126L2 Management Manual

Tigerswitch 10/100/1000 26/50-port gigabit managed switch
Hide thumbs Also See for SMC8126L2:
Table of Contents

Advertisement

4
Command Line Interface
Command Usage
• A colon (:) is required after the specified unit number and file type.
• If the file contains an error, it cannot be set as the default file.
Example
Console(config)#boot system config: startup
Console(config)#
Related Commands
dir (4-68)
whichboot (4-69)

Authentication Commands

You can configure this switch to authenticate users logging into the system for
management access using local or RADIUS authentication methods. You can also
enable port-based authentication for network client access using IEEE 802.1X.
Command Group

Authentication Sequence

RADIUS Client
TACACS+ Client
Port Security
Port Authentication
Authentication Sequence
Command
authentication login
authentication enable
4-70

Table 4-27 Authentication Commands

Function
Defines logon authentication method and precedence
Configures settings for authentication via a RADIUS server
Configures settings for authentication via a TACACS+ server
Configures secure addresses for a port
Configures host authentication on specific ports using 802.1X

Table 4-28 Authentication Sequence

Function
Defines logon authentication method and precedence
Defines the authentication method and precedence for
command mode change
Page
4-70
4-73
4-77
4-79
4-81
Mode
Page
GC
4-71
GC
4-72

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Smc8150l28126l28150l2

Table of Contents