Authentication Method List Examples - Cisco AS5300-96VOIP-A Software Configuration Manual

Universal access server
Table of Contents

Advertisement

Configuring Authentication

Authentication Method List Examples

This section shows some examples of authentication lists.
Authentication Method List Examples for Users Logging in to the Access Server
The following example creates a local authentication list for users logging in to any line on the access
server:
The following example specifies login authentication using RADIUS (the RADIUS daemon is
polled for authentication profiles):
The following example specifies login authentication using TACACS+ (the TACACS+ daemon is
polled for authentication profiles):
Authentication List Examples for Dial-In Users Using ARA to Access Network Resources
The following example creates a local authentication list for Macintosh users dialing in to an
AppleTalk network through the access server:
The following example specifies that Macintosh users dialing in to an AppleTalk network through
the access server be authenticated by a TACACS+ daemon:
The following example creates an authentication method list that:
Authentication Method List Examples for Users Dialing In Using PPP
The following example creates a TACACS+ authentication list for users connecting to interfaces
configured for dial-in using PPP. The name of the list is marketing. This example specifies that a
remote TACACS+ daemon be used as the security database. If this security database is not available,
the Cisco IOS software then polls the RADIUS daemon. Users are not authenticated if they are
already authenticated on a tty line.
In this example, default can be substituted for marketing if the administrator wants this list to be
the default list.
4-14
Cisco AS5300 Universal Access Server Software Configuration Guide
5300(config)# aaa authentication login default local
5300(config)# aaa authentication login default radius
5300(config)# aaa authentication login default tacacs+
5300(config)# aaa authentication arap default local
5300(config)# aaa authentication arap default tacacs+
Enables guest access if the guest has been authenticated at the EXEC facility
Queries a TACACS+ daemon for authentication
Polls the line (login) authentication password if the TACACS+ server has no information about
the user or if no TACACS+ server on the network responds
Uses the local security database if there is no line password
5300(config)# aaa authentication arap default auth-guest tacacs+ line local
5300(config)# aaa authentication ppp marketing if-needed tacacs+ radius

Advertisement

Table of Contents
loading

This manual is also suitable for:

As5300

Table of Contents