D-Link DGS-3600 Switch User Manual


 
xStack
®
DGS-3600 Series Layer 3 Gigabit Ethernet Managed Switch CLI Manual
59
show authen_policy
Purpose This command is used to display if the system access authentication policy is enabled or
disabled.
Syntax
show authen_policy
Description Displays if the system access authentication policy is enabled or disabled.
Parameters None.
Restrictions Only Administrator level users can issue this command.
Example usage:
To display if the system access authentication policy is enabled or disabled:
DGS-3627:admin# show authen_policy
Command: show authen_policy
Authentication Policy : Enabled
DGS-3627:admin#
create authen_login method_list_name
Purpose This command is used to create a user-defined method list of authentication methods for
users attempting to log in to the Switch.
Syntax
create authen_login method_list_name <string 15>
Description Creates a user-defined method list of authentication methods for users attempting to log into
the Switch. The maximum number of supported login method lists is 8.
Parameters
<string 15> - The user-defined method list name
Restrictions Only Administrator level users can issue this command.
Example usage:
To create a user-defined method list called “login_list_1” for users attempting to log in to the Switch:
DGS-3627:admin# create authen_login method_list_name login_list_1
Command: create authen_login method_list_name login_list_1
Success.
DGS-3627:admin#
config authen_login
Purpose This command is used to configure a user-defined or default method list of authentication
methods for users attempting to log in to the Switch.
Syntax
config authen_login [default | method_list_name <string 15>] method {tacacs | xtacacs
| tacacs+ | radius | server_group <string 15> | local | none}(1)
Description Configures a user-defined or default method list of authentication methods for users
attempting to log in to the Switch. The method sequence will affect the authentication result.
For example, if the user specifies tacacs+ first, then tacacs and local, when the user tries to
log in, the authentication request will be sent to the first server host in the tacacs+ built-in
server group. If the first server host in the tacacs+ group is missing, the authentication
request will be sent to the second server host in the tacacs+ group, and so on. If all server