41 User Authentication Commands

tacacs - Use TACACS server password.

Default Setting

Local

Command Mode

Global Configuration

Command Usage

RADIUS uses UDP while TACACS+ uses TCP. UDP only offers best effort delivery, while TCP offers a connection-oriented transport. Also, note that RADIUS encrypts only the password in the access-request packet from the client to the server, while TACACS+ encrypts the entire body of the packet.

RADIUS and TACACS+ logon authentication assigns a specific privilege level for each user name and password pair. The user name, password, and privilege level must be configured on the authentication server.

You can specify three authentication methods in a single command to indicate the authentication sequence. For example, if you enter “authentication login radius tacacs local,” the user name and password on the RADIUS server is verified first. If the RADIUS server is not available, then authentication is attempted on the TACACS+ server. If the TACACS+ server is not available, the local user name and password is checked.

Example

Console(config)#authentication login radius

Console(config)#

Related Commands

username - for setting the local user names and passwords (41-1)

authentication enable

This command defines the authentication method and precedence to use when changing from Exec command mode to Privileged Exec command mode with the enable command (see page 33-1). Use the no form to restore the default.

Syntax

authentication enable {[local] [radius] [tacacs]} no authentication enable

local - Use local password only.

radius - Use RADIUS server password only.

tacacs - Use TACACS server password.

Default Setting

Local

Command Mode

Global Configuration

41-4

Page 356
Image 356
Accton Technology 24/48-Port, ES4548D, ES4524D manual Authentication enable, Tacacs Use Tacacs server password, Local