D-Link DGS-3620-52T CLI Guide - Page 62
Access Authentication, Control AAC, Commands
View all D-Link DGS-3620-52T manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 62 highlights
xStack® DGS-3620 Series Layer 3 Managed Stackable Gigabit Switch CLI Reference Guide Chapter 4 Access Authentication Control (AAC) Commands enable authen_policy disable authen_policy show authen_policy create authen_login method_list_name config authen_login [default | method_list_name ] method {tacacs | xtacacs | tacacs+ | radius | server_group | local | none}(1) delete authen_login method_list_name show authen_login [default | method_list_name | all] create authen_enable method_list_name config authen_enable [default | method_list_name ] method {tacacs | xtacacs | tacacs+ | radius | server_group | local_enable | none}(1) delete authen_enable method_list_name show authen_enable [default | method_list_name | all] config authen application [console | telnet | ssh | http | all] [login | enable] [default | method_list_name ] show authen application create authen server_group config authen server_group [tacacs | xtacacs | tacacs+ | radius | ] [add | delete] server_host protocol [tacacs | xtacacs | tacacs+ | radius] delete authen server_group show authen server_group {} create authen server_host protocol [tacacs | xtacacs | tacacs+ | radius] {port | key [ | none] | timeout | retransmit } config authen server_host protocol [tacacs | xtacacs | tacacs+ | radius] {port | key [ | none] | timeout | retransmit }(1) delete authen server_host protocol [tacacs | xtacacs | tacacs+ | radius] show authen server_host config authen parameter response_timeout config authen parameter attempt show authen parameter enable admin config admin local_enable The TACACS / XTACACS / TACACS+ / RADIUS commands allows secure access to the Switch using the TACACS / XTACACS / TACACS+ / RADIUS protocols. When a user logs in to the Switch or tries to access the administrator level privilege, he or she is prompted for a password. If TACACS / XTACACS / TACACS+ / RADIUS authentication is enabled on the Switch, it will contact a TACACS / XTACACS / TACACS+ / RADIUS server to verify the user. If the user is verified, he or she is granted access to the Switch. There are currently three versions of the TACACS security protocol, each a separate entity. The Switch's software supports the following versions of TACACS: 1. TACACS (Terminal Access Controller Access Control System) -Provides password checking and authentication, and notification of user actions for security purposes utilizing 57