Dell Force10 S4820T FTOS Command Reference Guide - Page 1328
is not listed in the local database, the next method is applied. If the correct user name
View all Dell Force10 S4820T manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 1328 highlights
www.dell.com | support.dell.com Default Command Modes Command History Usage Information method ... method4 Enter one of the following methods: • enable - use the password defined by the enable password command in the CONFIGURATION mode. • line - use the password defined by the password command in the LINE mode. • local - use the user name/password defined by the in the local configuration. • none - no authentication. • radius - use the RADIUS server(s) configured with the radius-server host command. • tacacs+ - use the TACACS+ server(s) configured with the tacacs-server host command. (OPTIONAL) Enter up to four additional methods. In the event of a "no response" from the first method, FTOS applies the next configured method (up to four configured methods). Not configured (that is, no authentication is performed) CONFIGURATION Version 8.3.19.0 Version 8.3.7.0 Version 7.6.1.0 Version 7.5.1.0 pre-Version 6.2.1.0 Introduced on S4820T Introduced on S4810 Introduced for S-Series Introduced for C-Series Introduced on E-Series By default, the locally configured username password will be used. If aaa authentication login default is configured, FTOS will use the methods defined by this command for login instead. Methods configured with the aaa authentication login command are evaluated in the order they are configured. If users encounter an error with the first method listed, FTOS applies the next method configured. If users fail the first method listed, no other methods are applied. The only exception is the local method. If the user's name is not listed in the local database, the next method is applied. If the correct user name/ password combination are not entered, the user is not allowed access to the switch. Note: If authentication fails using the primary method, FTOS employs the second method (or third method, if necessary) automatically. For example, if the TACACS+ server is reachable, but the server key is invalid, FTOS proceeds to the next authentication method. The TACACS+ is incorrect, but the user is still authenticated by the secondary method. After configuring the aaa authentication login command, configure the login authentication command to enable the authentication scheme on terminal lines. Connections to the SSH server will work with the following login mechanisms: local, radius and tacacs. 1328 | Security