Authentication; Commands; User Accounts; Table 52: Authentication Commands - Edge-Core ECS4610-24F Management Manual

24-port layer 3 gigabit ethernet switch
Hide thumbs Also See for ECS4610-24F:
Table of Contents

Advertisement

27
U
A
SER
CCOUNTS
A
UTHENTICATION
You can configure this switch to authenticate users logging into the system
for management access using local or remote authentication methods.
Port-based authentication using IEEE 802.1X can also be configured to
control either management access to the uplink ports or client access
the data ports.

Table 52: Authentication Commands

Command Group
Function

User Accounts

Configures the basic user names and passwords for
management access
Authentication Sequence
Defines logon authentication method and precedence
RADIUS Client
Configures settings for authentication via a RADIUS server
TACACS+ Client
Configures settings for authentication via a TACACS+ server
AAA
Configures authentication, authorization, and accounting for
network access
Web Server
Enables management access via a web browser
Telnet Server
Enables management access via Telnet
Secure Shell
Provides secure replacement for Telnet
802.1X Port
Configures host authentication on specific ports using 802.1X

Authentication

Management IP Filter
Configures IP addresses that are allowed management access
The basic commands required for management access are listed in this
section. This switch also includes other options for password checking via
the console or a Telnet connection
remote authentication server
for specific ports
(page

Table 53: User Access Commands

Command
Function
enable password
Sets a password to control access to the Privileged
Exec level
username
Establishes a user name-based authentication
system at login
10. For other methods of controlling client access, see
page
707.
– 657 –
C
OMMANDS
(page
600), user authentication via a
(page
657), and host access authentication
693).
"General Security Measures" on
to
10
Mode
GC
GC

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents