User`s manual
180 Asanté IntraCore 36000 Series
Console(config)#
16.6 authentication enable
This command defines the authentication method and precedence to use when changing from Exec
command mode to Privileged Exec command mode with the enable command in Chpater 16. Use the no
form to restore the default.
Syntax Description
authentication enable {[local] [radius] [tacacs]}
no authentication enable
Local Use local password only.
radius Use RADIUS server password only.
tacacs Use TACACS server password.
Default
Local
Command Mode
Global Configuration
Usage Guidelines
RADIUS uses UDP while TACACS+ uses TCP. UDP only offers best effort delivery, while TCP offers a
connection-oriented transport. Also, note that RADIUS encrypts only the password in the access-request
packet from the client to the server, while TACACS+ encrypts the entire body of the packet.
RADIUS and TACACS+ logon authentication assigns a specific privilege level for each user name and
password pair. The user name, password, and privilege level must be configured on the authentication
server.
You can specify three authentication methods in a single command to indicate the authentication sequence.
For example, if you enter “authentication enable radius tacacs local,” the user name and password on the
RADIUS server is verified first. If the RADIUS server is not available, then authentication is attempted on the
TACACS+ server. If the TACACS+ server is not available, the local user name and password is checked.
Example
The following is sample output from the authentication enable command.
Console(config)#authentication enable radius
Console(config)#
Related Commands
enable password