mac
47
Switch(config)# authentication securityip 192.168.1.21
1.2.5 authentication securityipv6
Command: authentication securityipv6 <ipv6-addr>
no authentication securityipv6 <ipv6-addr>
Function: To configure the security IPv6 address for Telnet and HTTP login method. The
no form of this command will remove the specified configuration.
Parameters: <ipv6-addr> is the security IPv6 address which can login the switch.
Default: No security IPv6 addresses are configured by default.
Command Mode: Global Mode.
Usage Guide: IPv6 address of the client which can login the switch is not restricted before
the security IPv6 address is not configured. After the security IPv6 address is configured,
only clients with security IPv6 addresses are able to login the switch. Up to 32 security
IPv6 addresses can be configured in the switch.
Example: Configure the security IPv6 address is 2001:da8:123:1::1.
Switch(config)# authentication securityipv6 2001:da8:123:1::1
1.2.6 authorization
Command: authorization line {console | vty | web} exec {local | radius | tacacs}
no authorization line {console | vty | web} exec
Function: Configure VTY (login with Telnet and SSH), Web and Console, so as to select
the priority of the authorization mode for the login user. The no form command restores
the default authorization mode.
Default: There is no authorization mode.
Command Mode: Global Mode.
Usage Guide: The authorization method for Console, VTY and Web login can be
configured respectively. And authorization method can be any one or combination of Local,
RADIUS or TACACS. When login method is configuration in combination, the preference
goes from left to right. If the users have passed the authorization method, authorization
method of lower preferences will be ignored. To be mentioned, if the user receives
corresponding protocol‘s answer whether refuse or incept, it will not attempt the next
authorization method; it will attempt the next authorization method if it receives nothing.
And AAA function RADIUS server should be configured before the RADIUS configuration
method can be used. And TACACS server should be configured before the TACACS
configuration method can be used.
The local users adopt username command permission while authorization command










