Access Authentication Control Commands
Extreme Networks EAS 100-24t Switch CLI Manual
255
attempts to access the switch, the switch will select the first technique listed for authentication. If the
first technique goes through its server hosts and no authentication is returned, the switch will then go
to the next technique listed in the server group for authentication, until the authentication has been
verified or denied, or the list is exhausted.
Please note that user granted access to the switch will be granted normal user privileges on the switch.
To gain access to admin level privileges, the user must enter the enable admin command and then enter
a password, which was previously configured by the administrator of the switch.
TACACS, XTACACS and TACACS+ are separate entities and are not compatible. The switch and the
server must be configured exactly the same, using the same protocol. (For example, if the switch is set up for
TACACS authentication, so must the host server.)
The Access Authentication Control commands in the CLI are listed (along with the appropriate
parameters) in the following table.
Command Parameters
enable authen_policy
disable authen_policy
show authen_policy
create authen_login
method_list_name
<string 15>
config authen_login [default | method_list_name <string 15>] method {tacacs | xtacacs | tacacs+ |
radius | server_group <string 15> | local | none}
delete authen_login
method_list_name
<string 15>
show authen_login [default | method_list_name <string 15> | all]
create authen_enable
method_list_name
<string 15>
config authen_enable [default | method_list_name <string 15>] method {tacacs | xtacacs | tacacs+ |
radius | server_group <string 15> | local_enable | none}
delete authen_enable
method_list_name
<string 15>
show authen_enable [default | method_list_name <string 15> | all]
config authen application [console | telnet | ssh | http | all] [login | enable] [default| method_list_name
<string 15>]
show authen application
create authen server_group <string 15>
config authen server_group [tacacs | xtacacs | tacacs+ | radius | <string 15>] [add | delete] server_host
<ipaddr> protocol [tacacs | xtacacs | tacacs+ | radius]
delete authen server_group <string 15>
show authen server_group {<string 15>}
create authen server_host <ipaddr> protocol [tacacs | xtacacs | tacacs+ | radius] {port <int 1-65535> |
key [<key_string 254> | none] | timeout <int 1-255> | retransmit <int 1-255>}
config authen server_host <ipaddr> protocol [tacacs | xtacacs | tacacs+ | radius] {port <int 1-65535> |
key [<key_string 254> | none] | timeout <int 1-255> | retransmit <int 1-255>}
delete authen server_host <ipaddr> protocol [tacacs | xtacacs | tacacs+ | radius]