D-Link xStack DGS-3420 Series Reference Manual page 64

Layer 2 managed stackable gigabit switch cli
Hide thumbs Also See for xStack DGS-3420 Series:
Table of Contents

Advertisement

xStack® DGS-3420 Series Layer 2 Managed Stackable Gigabit Switch CLI Reference Guide
show aaa server_group {<string 15>}
show aaa server_host
enable aaa_server_password_encryption
disable aaa_server_password_encryption
create radius server_host <ipaddr> {auth_port <int 1-65535> | acct_port <int 1-65535> | [key
[<key_string 254> | none] | encryption_key <key_string 344>] | timeout <int 1-255> |
retransmit <int 1-20>}
config radius server_host <ipaddr> {auth_port <int 1-65535> | acct_port <int 1-65535> | [key
[<key_string 254> | none] | encryption_key <key_string 344>] | timeout <int 1-255> |
retransmit <int 1-20>}
config radius source_ipif [<ipif_name 12> {<ipaddr> | <ipv6addr>} | none]
show radius source_ipif
create tacacs server_host <ipaddr> {port <int 1-65535> | timeout <int 1-255> | retransmit <int 1-
20>}
config tacacs server_host <ipaddr> {port <int 1-65535> | timeout <int 1-255> | retransmit <int 1-
20>}
create tacacs+ server_host <ipaddr> {port <int 1-65535> | [key [<key_string 254> | none] |
encryption_key <key_string 344>] | timeout <int 1-255>}
config tacacs+ server_host <ipaddr> {port <int 1-65535> | [key [<key_string 254> | none] |
encryption_key <key_string 344>] | timeout <int 1-255>}
create xtacacs server_host <ipaddr> {port <int 1-65535> | timeout <int 1-255> | retransmit <int 1-
20>}
config xtacacs server_host <ipaddr> {port <int 1-65535> | timeout <int 1-255> | retransmit <int 1-
20>}
config tacacs source_ipif [<ipif_name 12> {<ipaddr>} | none]
show tacacs source_ipif
config accounting [default | method_list_name <string 15>] method {tacacs+ | radius |
server_group <string 15> | none}
config accounting service [network | shell | system] state [enable {[radius_only |
method_list_name <string 15> | default_method_list]} | disable]
config accounting service command {administrator | operator | power_user | user}
[method_list_name <string> | none]
create accounting method_list_name <string 15>
delete accounting method_list_name <string 15>
show accounting [default | method_list_name <string 15> | all]
show accounting service
The TACACS / XTACACS / TACACS+ / RADIUS commands allows secure access to the Switch using
the TACACS / XTACACS / TACACS+ / RADIUS protocols. When a user logs in to the Switch or tries
to access the administrator level privilege, he or she is prompted for a password. If TACACS /
XTACACS / TACACS+ / RADIUS authentication is enabled on the Switch, it will contact a TACACS /
XTACACS / TACACS+ / RADIUS server to verify the user. If the user is verified, he or she is granted
access to the Switch.
There are currently three versions of the TACACS security protocol, each a separate entity. The
Switch's software supports the following versions of TACACS:
TACACS (Terminal Access Controller Access Control System) —Provides password
checking and authentication, and notification of user actions for security purposes utilizing via
one or more centralized TACACS servers, utilizing the UDP protocol for packet transmission.
59

Advertisement

Table of Contents
loading

Table of Contents