Linksys DES-3028/DES-3028P/DES-3052/DES-3052P Portable DVD Player User Manual


 
DES-3028 DES-3028P DES-3052 DES-3052P Layer 2 Fast Ethernet Switch CLI Reference Manual
DES-3028P:4#
delete authen_enable method_list_name
Purpose Used to delete a user-defined method list of authentication methods
for promoting normal user level privileges to Administrator level
privileges on the Switch.
Syntax
delete authen_enable method_list_name <string 15>
Description This command is used to delete a user-defined method list of
authentication methods for promoting user level privileges to
Administrator level privileges.
Parameters <string 15> - Enter an alphanumeric string of up to 15 characters to
define the given enable method list to delete.
Restrictions Only administrator-level users can issue this command.
Example usage:
To delete the user-defined method list “Permit”
DES-3028P:4#delete authen_enable method_list_name Permit
Command: delete authen_enable method_list_name Permit
Success.
DES-3028P:4#
show authen_enable
Purpose Used to display the method list of authentication methods for promoting
normal user level privileges to Administrator level privileges on the Switch.
Syntax
show authen_enable [default | method_list_name <string 15> | all]
Description This command is used to delete a user-defined method list of
authentication methods for promoting user level privileges to Administrator
level privileges.
Parameters default – Entering this parameter will display the default method list for
users attempting to gain access to Administrator level privileges on the
Switch.
method_list_name <string 15> - Enter an alphanumeric string of up to 15
characters to define the given method list the user wishes to view.
all – Entering this parameter will display all the authentication login
methods currently configured on the Switch.
The window will display the following parameters:
Method List Name – The name of a previously configured method
list name.
Priority – Defines which order the method list protocols will be
queried for authentication when a user attempts to log on to the
Switch. Priority ranges from 1(highest) to 4 (lowest).
Method Name – Defines which security protocols are
implemented, per method list name.
Comment – Defines the type of Method. User-defined Group
refers to server groups defined by the user. Built-in Group refers
to the TACACS, XTACACS, TACACS+ and RADIUS security
protocols which are permanently set in the Switch. Keyword refers
to authentication using a technique INSTEAD of
TACACS/XTACACS/TACACS+/RADIUS which are local
(authentication through the local_enable password on the Switch)
194