•
Name the list default.
•
Assign a different name to the authentication list, and assign the new list to the vty
line using the
login authentication
command.
•
The authentication methods that you can use in a list include these options:
radius
,
line
,
,
none
, and
enable
.
•
The system traverses the list of authentication methods to determine whether a user
is allowed to start a Telnet session. If a specific method is available but the user
information is not valid (such as an incorrect password), the system does not continue
to traverse the list and denies the user a session.
•
If a specific method is unavailable, the system continues to traverse the list. For example,
if
is the first authentication type element on the list and the server
is unreachable, the system attempts to authenticate with the next authentication type
on the list, such as
radius
.
•
The system assumes an implicit denial of service if it reaches the end of the
authentication list without finding an available method.
•
Example
host1(config)#
aaa authentication login my_auth_list radius line none
•
Use the
no
version to remove the authentication list from your configuration.
•
See aaa authentication login.
aaa authorization
•
Use to set the parameters that restrict access to a network.
•
Use the keyword
exec
to determine if the user is allowed to run Exec mode commands.
The commands that you can execute from Exec mode provide only user-level access.
•
Use the keyword
commands
to run authorization for all commands at the specified
privilege level (0–15). See Table 45 on page 407 for a description of privilege levels.
•
You can enter up to three authorization types to use in an authorization method list.
Options include:
if-authenticated, none
, and
.
NOTE:
For information about , see JunosE Broadband Access
Configuration Guide.
•
Authorization method lists define the way authorization is performed and the sequence
in which the methods are performed. You can designate one or more security protocols
in the method list to be used for authorization. If the initial method fails, the next method
in the list is used. The process continues until either there is successful communication
with a listed authorization method or all methods defined are exhausted.
•
Example
host1(config)#
aaa authorization exec
417
Copyright © 2010, Juniper Networks, Inc.
Chapter 7: Passwords and Security
Summary of Contents for JUNOSE 11.3
Page 6: ...Copyright 2010 Juniper Networks Inc vi...
Page 8: ...Copyright 2010 Juniper Networks Inc viii JunosE 11 3 x System Basics Configuration Guide...
Page 24: ...Copyright 2010 Juniper Networks Inc xxiv JunosE 11 3 x System Basics Configuration Guide...
Page 32: ...Copyright 2010 Juniper Networks Inc 2 JunosE 11 3 x System Basics Configuration Guide...
Page 146: ...Copyright 2010 Juniper Networks Inc 116 JunosE 11 3 x System Basics Configuration Guide...
Page 166: ...Copyright 2010 Juniper Networks Inc 136 JunosE 11 3 x System Basics Configuration Guide...
Page 432: ...Copyright 2010 Juniper Networks Inc 402 JunosE 11 3 x System Basics Configuration Guide...
Page 488: ...Copyright 2010 Juniper Networks Inc 458 JunosE 11 3 x System Basics Configuration Guide...
Page 524: ...Copyright 2010 Juniper Networks Inc 494 JunosE 11 3 x System Basics Configuration Guide...
Page 554: ...Copyright 2010 Juniper Networks Inc 524 JunosE 11 3 x System Basics Configuration Guide...
Page 566: ...Copyright 2010 Juniper Networks Inc 536 JunosE 11 3 x System Basics Configuration Guide...
Page 588: ...Copyright 2010 Juniper Networks Inc 558 JunosE 11 3 x System Basics Configuration Guide...
Page 613: ...PART 3 Index Index on page 585 583 Copyright 2010 Juniper Networks Inc...
Page 614: ...Copyright 2010 Juniper Networks Inc 584 JunosE 11 3 x System Basics Configuration Guide...
Page 632: ...Copyright 2010 Juniper Networks Inc 602 JunosE 11 3 x System Basics Configuration Guide...