Allied Telesis AT-8100L/8POE Switch User Manual


 
Chapter 17: RADIUS and TACACS+ Clients
210
Caution
To define two or three servers that use different encryption keys, do
not enter a global encryption key value on this web page. Instead,
define the individual keys when you add the IP addresses of the
servers to the switch on the TACACS+ Add page. See “Adding a
RADIUS Server” on page 206.
TACACS+ Authentication Login— Enable or disable TACACS+
to authenticate user login. Choose from the following:
Enabled: The TACACS+ servers authenticate user login.
Disabled: The TACACS+ servers do not authenticate user
login. Authentication is attempted using the user name and
password combinations specified on the User Management
page and using the USERNAME command in the CLI.
AAA Authentication Login Local— Enable or disable TACACS+
to authenticate user login in combination with local manager
accounts. Choose from the following:
Enabled: The TACACS+ servers authenticate user login.
When any TACACS+ server is not available, authentication is
attempted using the user name and password combinations
specified on the User Management page and using the
USERNAME command in the CLI.
Disabled: The TACACS+ servers do not authenticate user
login. Authentication is attempted using the user name and
password combinations specified on the User Management
page and using the USERNAME command in the CLI.
Note
For additional information about the User Management page, see
“Managing Local User Accounts” on page 53. For more information
about the USERNAME command, see Chapter 88: Local Manager
Accounts in the AlliedWare Plus Management Software Version
2.2.4 Command Line Interface User’s Guide.
AAA Authentication Enable— Enable or disable TACACS+ to
authenticate users requesting the Privileged Exec mode. Choose
from the following:
Enabled: The TACACS+ determines whether users can
access the Privileged EXEC level using TACACS+ enable
password.