Allied Telesis AT-FS970M Series User Manual
Page 197
AT-FS970M Series Version 2.3.1.0 Web Interface User’s Guide
197
TACACS+ Authentication Login— Enable or disable TACACS+
to authenticate user login. Choose from the following:
Enabled: The TACACS+ servers authenticate user login.
Disabled: The TACACS+ servers do not authenticate user
login. Authentication is attempted using the username and
password combinations specified on the User Management
page and using the USERNAME command in the CLI.
AAA Authentication Login Local— Enable or disable TACACS+
to authenticate user login in combination with local manager
accounts. Choose from the following:
Enabled: The TACACS+ servers authenticate user login.
When any TACACS+ server is not available, authentication is
attempted using the username and password combinations
specified on the User Management page and using the
USERNAME command in the CLI.
Disabled: The TACACS+ servers do not authenticate user
login. Authentication is attempted using the username and
password combinations specified on the User Management
page and using the USERNAME command in the CLI.
Note
For additional information about the User Management page, see
“Managing Local User Accounts” on page 52. For more information
about the USERNAME command, see Chapter 88: Local Manager
Accounts in the AT-FS970M Series Version 2.3.1.0 Management
Software Command Line Interface User’s Guide.
AAA Authentication Enable— Enable or disable TACACS+ to
authenticate users requesting the Privileged Exec mode. Choose
from the following:
Enabled: The TACACS+ servers determine whether users can
access the Privileged EXEC level using the TACACS+ enable
password.
Disabled: The TACACS+ servers do not use its enable
password. Authentication is attempted using the password
specified using the ENABLE PASSWORD command in the CLI.
AAA Authentication Enable Local— Enable or disable
TACACS+ to authenticate users requesting the Privileged Exec
mode. Choose from the following:
Enabled: The TACACS+ servers determine whether users can
access the Privileged EXEC level using the TACACS+ enable
password. When any TACACS+ server is not available,