Linksys DES-3028/DES-3028P/DES-3052/DES-3052P Portable DVD Player User Manual


 
DES-3028 DES-3028P DES-3052 DES-3052P Layer 2 Fast Ethernet Switch CLI Reference Manual
Example usage:
To display the system access authentication policy:
DES-3028P:4#show authen_policy
Command: show authen_policy
Authentication Policy: Enabled
DES-3028P:4#
create authen_login method_list_name
Purpose Used to create a user defined method list of authentication methods
for users logging on to the Switch.
create authen_login method_list_name <string 15>
This command is used to create a list for authentication techniques
for user login. The Switch can support up to eight method lists, but
one is reserved as a default and cannot be deleted. Multiple method
lists must be created and configured separately.
Parameters <string 15> - Enter an alphanumeric string of up to 15 characters to
define the given method list.
Restrictions Only administrator-level users can issue this command.
Syntax
Description
Example usage:
To create the method list “Trinity.”:
DES-3028P:4#create authen_login method_list_name Trinity
Command: create authen_login method_list_name Trinity
Success.
DES-3028P:4#
config authen_login
Purpose Used to configure a user-defined or default method list of authentication
methods for user login.
Syntax
config authen_login [default | method_list_name <string 15>]
method {tacacs | xtacacs | tacacs+ | radius | server_group <string
15> | local | none}
Description This command will configure a user-defined or default method list of
authentication methods for users logging on to the Switch. The
sequence of methods implemented in this command will affect the
authentication result. For example, if a user enters a sequence of
methods like tacacs – xtacacs – local, the Switch will send an
authentication request to the first tacacs host in the server group. If no
response comes from the server host, the Switch will send an
authentication request to the second tacacs host in the server group and
so on, until the list is exhausted. At that point, the Switch will restart the
same sequence with the following protocol listed, xtacacs. If no
authentication takes place using the xtacacs list, the local account
database set in the Switch is used to authenticate the user. When the
local method is used, the privilege level will be dependant on the local
account privilege configured on the Switch.
188