This chapter shows you how to use the
34.1 sys Commands Overview
The
commands are for system management and maintenance.
sys
34.2 sys Commands Summary
The following table lists the
privilege level needed to use the command.
Table 387 sys Commands
COMMAND
sys aaa
auth
author
Management Switch Card User's Guide
C
HAPTER
commands.
sys
commands. The P column on the right indicates the administrator
sys
DESCRIPTION
Specifies which method should be used first and
enable <method1>
second for the authentication of users changing
[<method2>]
access privilege levels while logged in.
method: enable, or tacacs+.
Specifies which method should be used first,
login <method1>
second, and third for the authentication of login
[method2]
accounts. This is used to determine whether a user
[method3]
can log into the system or not.
[trycont]
method1, method2, method3: local, radius, or
tacacs+.
trycont: With this option specified, the system
tries to use the next method in turn if the first
method failed to authenticate a user. Without this
option specified, the authentication fails if the first
available method fails to authenticate users.
Displays what methods are used for
show
authentication.
Specifies the database the system uses to check
set <privilege>
whether a user is authorized to execute commands
<mode>
of the specified privilege level.
mode: 1: none, 2: local, 3:tacacs+, 4: tacacs+
then none, 5: tacacs+ then local
Displays which method the system uses to check
show
whether a user is authorized to execute commands
of specific privilege levels.
sys Commands
3 4
P
14
14
1
14
1
1031