CLI Guide

is applied. If the correct user name/password combination is not entered, the user
is not allowed access to the switch.
NOTE: If authentication fails using the primary method, Dell Networking OS
employs the second method (or third method, if necessary) automatically. For
example, if the TACACS+ server is reachable, but the server key is invalid, Dell
Networking OS proceeds to the next authentication method. The TACACS+ is
incorrect, but the user is still authenticated by the secondary method.
After configuring the aaa authentication login command, configure the
login authentication command to enable the authentication scheme on
terminal lines.
Connections to the SSH server work with the following login mechanisms: local,
radius, and tacacs.
Related
Commands
login authentication — enables AAA login authentication on the terminal lines.
password — creates a password.
radius-server host — specifies a RADIUS server host.
tacacs-server host — specifies a TACACS+ server host.
access-class
Restrict incoming connections to a particular IP address in a defined IP access control list (ACL).
Syntax
access-class access-list-name
To delete a setting, use the no access-class command.
Parameters
access-list-name Enter the name of an established IP Standard ACL.
Defaults Not configured.
Command Modes LINE
Command History
This guide is platform-specific. For command information about other platforms,
see the relevant Dell Networking OS Command Line Reference Guide.
Version Description
9.8(2.0) Introduced on the S3100 series.
9.8(0.0P5) Introduced on the S4048-ON.
9.8(0.0P2) Introduced on the S3048-ON.
9.7(0.0) Introduced on the S6000–ON.
9.2(1.0) Introduced on the Z9500.
9.0.2.0 Introduced on the S6000.
8.3.19.0 Introduced on the S4820T.
Security
1545