Table 40: Authentication List Summary Fields (continued)
Field
Description
List Type
The type of list, which is one of the following:
•
Default – The list is preconfigured on the system. This type of list cannot be
deleted, and only the Method Options are configurable.
•
Configured – The list has been added by a user.
Access Line
The access method(s) that use the list for authentication. The settings for this
field are configured on the Authentication Selection page.
•
Click
Refresh
to update the information on the screen.
•
To create a new authentication list, see
on page 59. To assign users to a
specific authentication list, see
on page 57. To configure the 802.1x port security
users, see
Select Authentication List
Use the Select Authentication List Configuration page to associate an authentication list with each CLI-
based access method (console, Telnet, and SSH). Each access method has the following two
authentication lists associated with it:
•
Login – The authentication list to use for User EXEC-level management access to the CLI. Access at
this level has a limited number of CLI commands available to view or configure the system. The
options available in this menu include the default Login authentication lists as well as any user-
configured Login lists.
•
Enable – The authentication list to use for Privileged EXEC-level management access to the CLI. In
Privileged EXEC mode, read-write users have access to all CLI commands. The options available in
this menu include the default Enable authentication lists as well as any user-configured Enable lists.
To access this page, click
System
>
AAA
>
Authentication Selection
in the navigation menu.
shows the fields for this page.
Table 41: Select Authentication List Fields
Field
Description
Console
The Login authentication list and the Enable authentication list to apply to users
who attempt to access the CLI by using a connection to the console port.
Telnet
The Login authentication list and the Enable authentication list to apply to users
who attempt to access the CLI by using a Telnet session.
Secure Telnet (SSH)
The Login authentication list and the Enable authentication list to apply to users
who attempt to access the CLI by using a secure shell (SSH) session.
List Name
The name of the authentication list. This field can be configured only when
adding a new authentication list.
Configuring System Information
ExtremeSwitching 200 Series: Administration Guide
66