Concept Guide
aaa authentication login
Congure AAA Authentication method lists for user access to EXEC mode (Enable log-in).
Syntax
aaa authentication login {method-list-name | default} method [... method4]
To return to the default setting, use the no aaa authentication login {method-list-name |
default} command.
Parameters
method-list-name Enter a text string (up to 16 characters long) as the name of a user-congured method
list that can be applied to dierent lines.
default Enter the keyword default to specify that the method list specied is the default
method for all terminal lines.
method Enter one of the following methods:
• enable: use the password the enable password command denes in
CONFIGURATION mode.
• line: use the password the password command denes in LINE mode.
•
none: no authentication.
• radius: use the RADIUS servers congured with the radius-server host
command.
• tacacs+: use the TACACS+ servers congured with the tacacs-server host
command.
... method4 (OPTIONAL) Enter up to four additional methods. In the event of a “no response” from
the rst method, Dell Networking Operating System (OS) applies the next congured
method (up to four congured methods).
Defaults Not congured (that is, no authentication is performed).
Command Modes CONFIGURATION
Supported Modes All Modes
Command History
Version Description
9.11(0.0) Included a prompt to force the users to re-authenticate, when re-authentication is
enabled.
9.9(0.0) Introduced on the FN IOM.
9.4(0.0) Supported on the FN I/O Aggregator.
9.3(0.0) Supported on the M I/O Aggregator.
Usage Information
By default, the locally congured username password is used. If you congure aaa authentication login
default, Dell Networking Operating System (OS) uses the methods this command denes for login instead.
Methods congured with the aaa authentication login command are evaluated in the order they are
congured. If users encounter an error with the rst method listed, Dell Networking Operating System (OS) applies
the next method congured. If users fail the rst method listed, no other methods are applied. The only exception
is the local method. If the user’s name is not listed in the local database, the next method is applied. If the correct
user name/password combination is not entered, the user is not allowed access to the switch.
Security 1149