Concept Guide

aaa authentication login
Congure AAA Authentication method lists for user access to EXEC mode (Enable log-in).
Syntax
aaa authentication login {method-list-name | default} method [... method4]
To return to the default setting, use the no aaa authentication login {method-list-name |
default} command.
Parameters
method-list-name Enter a text string (up to 16 characters long) as the name of a user-congured method
list that can be applied to dierent lines.
default Enter the keyword default to specify that the method list specied is the default
method for all terminal lines.
method Enter one of the following methods:
enable: use the password the enable password command denes in
CONFIGURATION mode.
line: use the password the password command denes in LINE mode.
none: no authentication.
radius: use the RADIUS servers congured with the radius-server host
command.
tacacs+: use the TACACS+ servers congured with the tacacs-server host
command.
... method4 (OPTIONAL) Enter up to four additional methods. In the event of a “no response” from
the rst method, Dell Networking Operating System (OS) applies the next congured
method (up to four congured methods).
Defaults Not congured (that is, no authentication is performed).
Command Modes CONFIGURATION
Supported Modes All Modes
Command History
Version Description
9.11(0.0) Included a prompt to force the users to re-authenticate, when re-authentication is
enabled.
9.9(0.0) Introduced on the FN IOM.
9.4(0.0) Supported on the FN I/O Aggregator.
9.3(0.0) Supported on the M I/O Aggregator.
Usage Information
By default, the locally congured username password is used. If you congure aaa authentication login
default, Dell Networking Operating System (OS) uses the methods this command denes for login instead.
Methods congured with the aaa authentication login command are evaluated in the order they are
congured. If users encounter an error with the rst method listed, Dell Networking Operating System (OS) applies
the next method congured. If users fail the rst method listed, no other methods are applied. The only exception
is the local method. If the user’s name is not listed in the local database, the next method is applied. If the correct
user name/password combination is not entered, the user is not allowed access to the switch.
Security 1149