Reference Guide

118 Configuring System Information
DELL CONFIDENTIAL – PRELIMINARY 3/6/14 - FOR PROOF ONLY
RADIUS
— The user authentication is performed by the
RADIUS server. For more information, see RADIUS.
TACACS+
— The user authentication is performed by the
TACACS+ server. For more information, see TACACS+.
None
— No user authentication occurs.
Select a method by highlighting it in the
Optional Methods
list, and
clicking on the right arrow to move it to the
Selected Methods
list.
Configuring an Authentication Profile Using CLI Commands
The following table summarizes the CLI commands for setting fields
displayed in the Authentication Profiles pages.
The following is an example of the CLI commands:
Select Authentication
After Authentication Profiles are defined, the Authentication Profiles can be
assigned to Management Access methods, for example, console users can be
authenticated by Authentication Profile 1, while Telnet users can be
authenticated by Authentication Profile 2.
To assign an authentication profile to a management access method:
1
Click
System
>
Management Security
>
Select Authentication
in the
tree view to display the
Select Authentication
page.
2
For the
Console
,
Telnet
and
Secure Telnet (SSH)
types of users, select
either the default authentication profile or one of the previously-defined
authentication profiles.
Table 7-25. Authentication Profile CLI Commands
CLI Command Description
aaa authentication login
{default | list-name} method1
[method2...]
no aaa authentication login
{default | list-name}
Configures login authentication.
Use the no form of the command to
remove a login authentication profile.
console(config)# aaa authentication login default
radius local enable none