3com S7906E Guide De Référence

Page de 2327
 
1-2 
 
****************************************************************************** 
* Copyright (c) 2004-2009 3Com Corp. and its licensors. All rights reserved. * 
* This software is protected by copyright law and international treaties.    * 
* Without the prior written permission of 3Com Corporation and its licensors,* 
* any reproduction republication, redistribution, decompiling, reverse       * 
* engineering is strictly prohibited. Any unauthorized use of this software  * 
* or any portion of it may result in severe civil and criminal penalties, and* 
* will be prosecuted to the maximum extent possible under the applicable law.* 
****************************************************************************** 
User interface aux0 is available. 
 
 
Please press ENTER. 
 
<Sysname> 
%Apr 28 04:33:11:611 2005 Sysname SHELL/5/LOGIN: Console login from aux0 
authentication-mode 
Syntax 
authentication-mode { none | password | scheme [ command-authorization ] } 
View 
User interface view 
Default Level 
3: Manage level 
Parameters 
none: Does not authenticate users. 
password: Authenticates users using the local password. 
scheme: Authenticates users locally or remotely using usernames and passwords. 
command-authorization: Performs command authorization on TACACS authentication server. 
Description 
Use the authentication-mode command to specify the authentication mode. 
If you specify the password keyword to authenticate users using the local password, remember to 
set the local password using the set authentication password { cipher | simple } password 
command. 
If you specify the scheme keyword to authenticate users locally or remotely using usernames and 
passwords, the actual authentication mode depends on other related configuration. Refer to the 
AAA-RADIUS-HWTACACS module of this manual for more. 
If this command is executed with the command-authorization keywords specified, authorization 
is performed on the TACACS server whenever you attempt to execute a command, and the 
command can be executed only when you pass the authorization. Normally, a TACACS server 
contains a list of the commands available to different users.