The documentation set for this product strives to use bias-free language. For the purposes of this documentation set, bias-free is defined as language that does not imply discrimination based on age, disability, gender, racial identity, ethnic identity, sexual orientation, socioeconomic status, and intersectionality. Exceptions may be present in the documentation due to language that is hardcoded in the user interfaces of the product software, language used based on RFP documentation, or language that is used by a referenced third-party product. Learn more about how Cisco is using Inclusive Language.
This chapter describes the Cisco Nexus 1010 commands that begin with the letter A.
To configure AAA authentication methods for console logins, use the aaa authentication login console command. To revert to the default, use the no form of this command.
aaa authentication login console {group group-list} [none] | local | none}
no aaa authentication login console {group group-list [none] | local | none}
local
Global configuration (config)
network-admin
|
|
4.0(4)SP1(1) |
This command was introduced. |
This example shows how to configure the AAA authentication console login methods:
switch# config t
switch(config)# aaa authentication login console group tacacs+
This example shows how to revert to the default AAA authentication console login method:
switch# config t
switch(config)# no aaa authentication login console group tacacs+
To configure the default AAA authentication methods, use the aaa authentication login default command. To revert to the default, use the no form of this command.
aaa authentication login default {group group-list} [none] | local | none}
no aaa authentication login default {group group-list [none] | local | none}
local
Global configuration (config)
network-admin
|
|
4.0(4)SP1(1) |
This command was introduced. |
This example shows how to configure the AAA authentication console login method:
switch# config t
switch(config)# aaa authentication login default group tacacs+
This example shows how to revert to the default AAA authentication console login method:
switch# config t
switch(config)# no aaa authentication login default group tacacs+
To configure an AAA authentication failure message to display on the console, use the aaa authentication login error-enable command. To remove the error message, use the no form of this command.
aaa authentication login error-enable
no aaa authentication login error-enable
This command has no arguments or keywords.
Disabled
Global configuration (config)
network-admin
|
|
4.0(4)SP1(1) |
This command was introduced. |
If none of the remote AAA servers respond when a user logs in, the authentication is processed by the local user database. If you have enabled the display, one of the following messages is generated for the user:
Remote AAA servers unreachable; local authentication done.
Remote AAA servers unreachable; local authentication failed.
This example shows how to enable the display of AAA authentication failure messages to the console:
switch# config t
switch(config)# aaa authentication login error-enable
This example shows how to disable the display of AAA authentication failure messages to the console:
switch# config t
switch(config)# no aaa authentication login error-enable
|
|
---|---|
show aaa authentication |
Displays the configuration for AAA authentication. |
To enable Microsoft Challenge Handshake Authentication Protocol (MSCHAP) authentication at login, use the aaa authentication login mschap command. To disable MSCHAP, use the no form of this command.
aaa authentication login mschap
no aaa authentication login mschap
This command has no arguments or keywords.
Disabled
Global configuration (config)
network-admin
|
|
4.0(4)SP1(1) |
This command was introduced. |
This example shows how to enable MSCHAP authentication:
switch# config t
switch(config)# aaa authentication login mschap
This example shows how to disable MSCHAP authentication:
switch# config t
switch(config)# no aaa authentication login mschap
|
|
---|---|
show aaa authentication |
Displays the configuration for AAA authentication. |
To create a TACACS+ server group, use the aaa group server tacacs+ command. To delete a TACACS+ server group, use the no form of this command.
aaa group server tacacs+ group-name
no aaa group server tacacs+ group-name
group-name |
TACACS+ server group name. The name is alphanumeric and case sensitive. The maximum length is 64 characters. |
None
Global configuration (config)
network-admin
|
|
4.0(4)SP1(1) |
This command was introduced. |
You must enable TACACS+ using the tacacs+ enable command before you can configure TACACS+.
This example shows how to create a TACACS+ server group:
switch# config t
switch(config)# aaa group server tacacs+ TacServer
switch(config-tacacs)#
This example shows how to delete a TACACS+ server group:
switch# config t
switch(config)# no aaa group server tacacs+ TacServer
|
|
---|---|
tacacs+ enable |
Enables TACACS+. |
show aaa groups |
Displays server group information. |
To access the standby Virtual Supervisor Module (VSM) console from the active VSM, use the attach module command.
attach module module-number
module-number |
Number that identifies an existing module. The range is from 1 to 66. Note Only one value, 2, is operational. |
None
Global configuration (config)
network-admin
|
|
4.0(4)SP1(1) |
This command was introduced. |
This example shows how to attach to the console of the secondary VSM:
switch# config t
n1000v(
config)
# attach module 2
switch#
Although the allowable range of module numbers is from 1 to 66, only one value, 2, is operational.
|
|
---|---|
show cores |
Displays a list of cores. |
show processes |
Displays the state and the start count of all processes. |
reload module |
Reloads a module. |