EasyManua.ls Logo

FoxGate S6124 - Authentication Securityipv6; Authorization

Default Icon
391 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
37
the trusted IP address is not configured. After the trusted IP address is configured, only
clients with trusted IP addresses are able to login the switch. Up to 32 trusted IP
addresses can be configured in the switch.
Example: To configure 192.168.1.21 as the trusted IP address.
Switch(config)# authentication securityip 192.168.1.21
1.2.5 authentication securityipv6
Command: authentication securityipv6 <ipv6-addr>
no authentication securityipv6 <ipv6-addr>
Function: To configure the trusted IPv6 address for Telnet and HTTP login method. The
no form of this command will remove the specified configuration.
Parameters: <ipv6-addr> is the trusted IPv6 address which can login the switch.
Default: No trusted IPv6 addresses are configured by default.
Command Mode: Global Mode.
Usage Guide: IPv6 address of the client which can login the switch is not restricted before
the trusted IPv6 address is not configured. After the trusted IPv6 address is configured,
only clients with trusted IPv6 addresses are able to login the switch. Up to 32 trusted IPv6
addresses can be configured in the switch.
Example: Configure the secure IPv6 address is 2001:da8:123:1::1.
Switch(config)# authentication securityipv6 2001:da8:123:1::1
1.2.6 authorization
Command: authorization line {console | vty | web} exec {local | radius | tacacs}
no authorization line {console | vty | web} exec
Function: Configure VTY (login with Telnet and SSH), Web and Console, so as to select
the priority of the authorization mode for the login user. The no form command restores
the default authorization mode.
Default: There is no authorization mode.
Command Mode: Global Mode.
Usage Guide: The authorization method for Console, VTY and Web login can be
configured respectively. And authorization method can be any one or combination of Local,
RADIUS or TACACS. When login method is configuration in combination, the preference
goes from left to right. If the users have passed the authorization method, authorization
method of lower preferences will be ignored. To be mentioned, if the user receives

Table of Contents

Related product manuals