D-Link 3324SRi Reference Manual - Page 172

config authen_login, DGS-3324SRi:4#create authen_login method_list_name Trinity - dgs default password

Page 172 highlights

xStack Gigabit Layer 3 Switch Command Line Interface Manual DGS-3324SRi:4#create authen_login method_list_name Trinity Command: create authen_login method_list_name Trinity Success. DGS-3324SRi:4# config authen_login Purpose Syntax Description Parameters Used to configure a user-defined or default method list of authentication methods for user login. config authen_login [default | method_list_name ] method {tacacs | xtacacs | tacacs+ | radius | server_group | local | none} This command will configure a user-defined or default method list of authentication methods for users logging on to the Switch. The sequence of methods implemented in this command will affect the authentication result. For example, if a user enters a sequence of methods like tacacs - xtacacs - local, the Switch will send an authentication request to the first tacacs host in the server group. If no response comes from the server host, the Switch will send an authentication request to the second tacacs host in the server group and so on, until the list is exhausted. At that point, the Switch will restart the same sequence with the following protocol listed, xtacacs. If no authentication takes place using the xtacacs list, the local account database set in the Switch is used to authenticate the user. When the local method is used, the privilege level will be dependant on the local account privilege configured on the Switch. Successful login using any of these methods will give the user a "user" privilege only. If the user wishes to upgrade his or her status to the administrator level, the user must implement the enable admin command, followed by a previously configured password. (See the enable admin part of this section for more detailed information, concerning the enable admin command.) default - The default method list for access authentication, as defined by the user. The user may choose one or a combination of up to four (4) of the following authentication methods: tacacs - Adding this parameter will require the user to be authenticated using the TACACS protocol from the remote TACACS server hosts of the TACACS server group list. xtacacs - Adding this parameter will require the user to be authenticated using the XTACACS protocol from the remote XTACACS server hosts of the XTACACS server group list. tacacs+ - Adding this parameter will require the user to be authenticated using the TACACS+ protocol from the remote TACACS+ server hosts of the TACACS+ server group list. radius - Adding this parameter will require the user to be authenticated using the RADIUS protocol from the RADIUS server listed in the server group list. server_group - Adding this parameter will require the user to be authenticated using a user-defined server 164

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357

xStack Gigabit Layer 3 Switch Command Line Interface Manual
DGS-3324SRi:4#create authen_login method_list_name Trinity
Command: create authen_login method_list_name Trinity
Success.
DGS-3324SRi:4#
config authen_login
Purpose
Used to configure a user-defined or default
method list
of
authentication methods for user login.
Syntax
config authen_login [default | method_list_name <string 15>]
method {tacacs | xtacacs | tacacs+ | radius | server_group
<string 15> | local | none}
Description
This command will configure a user-defined or default
method list
of
authentication methods for users logging on to the Switch. The
sequence of methods implemented in this command will affect the
authentication result. For example, if a user enters a sequence of
methods like
tacacs – xtacacs – local,
the Switch will send an
authentication request to the first
tacacs
host in the server group. If
no response comes from the server host, the Switch will send an
authentication request to the second
tacacs
host in the server group
and so on, until the list is exhausted. At that point, the Switch will
restart the same sequence with the following protocol listed,
xtacacs
.
If no authentication takes place using the
xtacacs
list, the
local
account database set in the Switch is used to authenticate the user.
When the local method is used, the privilege level will be dependant
on the local account privilege configured on the Switch.
Successful login using any of these methods will give the user a
“user” privilege only. If the user wishes to upgrade his or her status to
the administrator level, the user must implement the
enable admin
command, followed by a previously configured password. (
See the
enable admin
part of this section for more detailed information,
concerning the
enable admin
command.)
Parameters
default
– The default method list for access authentication, as defined
by the user. The user may choose one or a combination of up to four
(4) of the following authentication methods:
±
tacacs
– Adding this parameter will require the user to be
authenticated using the TACACS protocol from the remote
TACACS
server hosts
of the TACACS
server group
list.
±
xtacacs
– Adding this parameter will require the user to be
authenticated using the XTACACS protocol from the remote
XTACACS
server hosts
of the XTACACS
server group
list.
±
tacacs+
– Adding this parameter will require the user to be
authenticated using the TACACS+
protocol from the remote
TACACS+
server hosts
of the TACACS+
server group
list.
±
radius
- Adding this parameter will require the user to be
authenticated using the
RADIUS protocol from the RADIUS
server listed in the
server group
list.
±
server_group <string 15>
- Adding this parameter will require
the user to be authenticated using a user-defined server
164