User authentication Example user configuration
IX14 User Guide
235
In this example, when the user attempts to log in to the IX14 device, user authentication will occur in
the following order:
1. The user is authenticated by the RADIUS server. If the RADIUS server is unavailable,
2. The user is authenticated by the TACACS+ server. If both the RADIUSand TACACS+ servers are
unavailable,
3. The user is authenticated by the IX14 device using local authentication.
This example uses a FreeRadius 3.0 server running on ubuntu, and a TACACS+ server running on
ubuntu. Server configuration may vary depending on the platforms or type of servers used in your
environment.