D-Link DXS-3326GSR Reference Manual page 174

High-density layer 3 gigabit switch
Hide thumbs Also See for DXS-3326GSR:
Table of Contents

Advertisement

create authen_login method_list_name
Parameters
Restrictions
Example usage:
To create the method list "Trinity.":
DXS-3326GSR:4#create authen_login method_list_name Trinity
Command: create authen_login method_list_name Trinity
Success.
DXS-3326GSR:4#
config authen_login
Purpose
Syntax
Description
DXS-3326GSR Stackable Gigabit Layer 3 Switch
for user login. The Switch can support up to eight method lists, but
one is reserved as a default and cannot be deleted. Multiple method
lists must be created and configured separately.
<string 15> - Enter an alphanumeric string of up to 15 characters to
define the given method list.
Only administrator-level users can issue this command.
Used to configure a user-defined or default method list of
authentication methods for user login.
config authen_login [default | method_list_name <string 15>]
method {tacacs | xtacacs | tacacs+ | radius | server_group
<string 15> | local | none}
This command will configure a user-defined or default method list of
authentication methods for users logging on to the Switch. The
sequence of methods implemented in this command will affect the
authentication result. For example, if a user enters a sequence of
methods like tacacs – xtacacs – local, the Switch will send an
authentication request to the first tacacs host in the server group. If
no response comes from the server host, the Switch will send an
authentication request to the second tacacs host in the server group
and so on, until the list is exhausted. At that point, the Switch will
restart the same sequence with the following protocol listed, xtacacs.
If no authentication takes place using the xtacacs list, the local
account database set in the Switch is used to authenticate the user.
When the local method is used, the privilege level will be dependant
on the local account privilege configured on the Switch.
Successful login using any of these methods will give the user a
"user" privilege only. If the user wishes to upgrade his or her status to
the administrator level, the user must implement the enable admin
command, followed by a previously configured password. (See the
enable admin part of this section for more detailed information,
concerning the enable admin command.)
166

Advertisement

Table of Contents
loading

Table of Contents