Reference Guide

788 | Security
www.dell.com | support.dell.com
To view the configuration, use the show config in the LINE mode or the show running-config tacacs+
command in the EXEC Privilege mode.
If authentication fails using the primary method, Dell Networking OS employs the second method (or third
method, if necessary) automatically. For example, if the TACACS+ server is reachable, but the server key
is invalid, Dell Networking OS proceeds to the next authentication method. In Figure 44-4, the TACACS+
is incorrect, but the user is still authenticated by the secondary method.
2
aaa authentication login {method-list-name
| default} tacacs+ [...method3]
CONFIGURATION Enter a text string (up to 16 characters
long) as the name of the method list you
wish to use with the TACAS+
authentication method
The tacacs+ method should not be the last
method specified.
3
line {aux 0 | console 0 | vty number
[end-number]}
CONFIGURATION Enter the LINE mode.
4
login authentication {method-list-name |
default}
LINE Assign the method-list to the terminal line.
Step Command Syntax Command Mode Purpose