D-Link DES-3828 Product Manual - Page 260

config authen_login, enable admin

Page 260 highlights

xStack DES-3800 Series Layer 3 Stackable Fast Ethernet Managed Switch CLI Manual config authen_login implemented in this command will affect the authentication result. For example, if a user enters a sequence of methods like tacacs - xtacacs - local, the Switch will send an authentication request to the first tacacs host in the server group. If no response comes from the server host, the Switch will send an authentication request to the second tacacs host in the server group and so on, until the list is exhausted. At that point, the Switch will restart the same sequence with the following protocol listed, xtacacs. If no authentication takes place using the xtacacs list, the local account database set in the Switch is used to authenticate the user. When the local method is used, the privilege level will be dependant on the local account privilege configured on the Switch. Successful login using any of these methods will give the user a "user" privilege only. If the user wishes to upgrade his or her status to the administrator level, the user must implement the enable admin command, followed by a previously configured password. (See the enable admin part of this section for more detailed information, concerning the enable admin command.) Parameters default - The default method list for access authentication, as defined by the user. The user may choose one or a combination of up to four(4) of the following authentication methods: ƒ tacacs - Adding this parameter will require the user to be authenticated using the TACACS protocol from the remote TACACS server hosts of the TACACS server group list. ƒ xtacacs - Adding this parameter will require the user to be authenticated using the XTACACS protocol from the remote XTACACS server hosts of the XTACACS server group list. ƒ tacacs+ - Adding this parameter will require the user to be authenticated using the TACACS+ protocol from the remote TACACS+ server hosts of the TACACS+ server group list. ƒ radius - Adding this parameter will require the user to be authenticated using the RADIUS protocol from the remote RADIUS server hosts of the RADIUS server group list. ƒ server_group - Adding this parameter will require the user to be authenticated using a user-defined server group previously configured on the Switch. ƒ local - Adding this parameter will require the user to be authenticated using the local user account database on the Switch. ƒ none - Adding this parameter will require no authentication to access the Switch. method_list_name - Enter a previously implemented method list name defined by the user. The user may add one, or a combination of up to four (4) of the following authentication methods to this method list: ƒ tacacs - Adding this parameter will require the user to be authenticated using the TACACS protocol from a remote TACACS server. ƒ xtacacs - Adding this parameter will require the user to be authenticated using the XTACACS protocol from a remote XTACACS server. ƒ tacacs+ - Adding this parameter will require the user to be authenticated using the TACACS+ protocol from a remote TACACS+ server. ƒ radius - Adding this parameter will require the user to be authenticated using the RADIUS protocol from a remote RADIUS server. ƒ server_group - Adding this parameter will require the user to be authenticated using a user-defined server group previously configured on the Switch. ƒ local - Adding this parameter will require the user to be authenticated using the local user account database on the Switch. ƒ none - Adding this parameter will require no authentication to access the Switch. 256

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384
  • 385
  • 386
  • 387
  • 388
  • 389
  • 390
  • 391
  • 392
  • 393
  • 394
  • 395
  • 396
  • 397
  • 398
  • 399
  • 400
  • 401
  • 402
  • 403
  • 404
  • 405
  • 406
  • 407
  • 408
  • 409
  • 410
  • 411
  • 412
  • 413
  • 414
  • 415
  • 416
  • 417
  • 418
  • 419
  • 420
  • 421
  • 422
  • 423
  • 424
  • 425
  • 426
  • 427
  • 428
  • 429
  • 430
  • 431
  • 432
  • 433
  • 434
  • 435
  • 436
  • 437
  • 438
  • 439
  • 440
  • 441
  • 442
  • 443
  • 444
  • 445
  • 446
  • 447
  • 448
  • 449
  • 450
  • 451
  • 452

xStack DES-3800 Series Layer 3 Stackable Fast Ethernet Managed Switch CLI Manual
256
config authen_login
implemented in this command will affect the authentication result. For example, if a
user enters a sequence of methods like
tacacs – xtacacs – local,
the Switch will
send an authentication request to the first
tacacs
host in the server group. If no
response comes from the server host, the Switch will send an authentication
request to the second
tacacs
host in the server group and so on, until the list is
exhausted. At that point, the Switch will restart the same sequence with the
following protocol listed,
xtacacs
. If no authentication takes place using the
xtacacs
list, the
local
account database set in the Switch is used to authenticate the user.
When the local method is used, the privilege level will be dependant on the local
account privilege configured on the Switch.
Successful login using any of these methods will give the user a “user” privilege
only. If the user wishes to upgrade his or her status to the administrator level, the
user must implement the
enable admin
command, followed by a previously
configured password. (
See the
enable admin
part of this section for more detailed
information, concerning the
enable admin
command.)
Parameters
default
– The default method list for access authentication, as defined by the user.
The user may choose one or a combination of up to four(4) of the following
authentication methods:
±
tacacs
– Adding this parameter will require the user to be authenticated
using the
TACACS
protocol from the remote TACACS
server hosts
of the
TACACS
server group
list.
±
xtacacs
– Adding this parameter will require the user to be authenticated
using the
XTACACS
protocol from the remote XTACACS
server hosts
of
the XTACACS
server group
list.
±
tacacs+
– Adding this parameter will require the user to be authenticated
using the
TACACS+
protocol from the remote TACACS+
server hosts
of
the TACACS+
server group
list.
±
radius
- Adding this parameter will require the user to be authenticated
using the
RADIUS
protocol from the remote RADIUS
server hosts
of the
RADIUS
server group
list.
±
server_group <string 15>
- Adding this parameter will require the user to
be authenticated using a user-defined server group previously configured
on the Switch.
±
local -
Adding this parameter will require the user to be authenticated
using the local
user account
database on the Switch.
±
none
– Adding this parameter will require no authentication to access the
Switch.
method_list_name
– Enter a previously implemented method list name defined by
the user. The user may add one, or a combination of up to four (4) of the following
authentication methods to this method list:
±
tacacs
– Adding this parameter will require the user to be authenticated
using the
TACACS
protocol from a remote TACACS server.
±
xtacacs
– Adding this parameter will require the user to be authenticated
using the
XTACACS
protocol from a remote XTACACS server.
±
tacacs+
– Adding this parameter will require the user to be authenticated
using the
TACACS+
protocol from a remote TACACS+ server.
±
radius
- Adding this parameter will require the user to be authenticated
using the
RADIUS
protocol from a remote RADIUS server.
±
server_group <string 15>
- Adding this parameter will require the user to
be authenticated using a user-defined server group previously configured
on the Switch.
±
local
- Adding this parameter will require the user to be authenticated
using the local
user account
database on the Switch.
±
none
– Adding this parameter will require no authentication to access the
Switch.