The documentation set for this product strives to use bias-free language. For the purposes of this documentation set, bias-free is defined as language that does not imply discrimination based on age, disability, gender, racial identity, ethnic identity, sexual orientation, socioeconomic status, and intersectionality. Exceptions may be present in the documentation due to language that is hardcoded in the user interfaces of the product software, language used based on RFP documentation, or language that is used by a referenced third-party product. Learn more about how Cisco is using Inclusive Language.
This chapter describes the Cisco Nexus 1000V commands that begin with A.
To configure AAA authentication methods for console logins, use the aaa authentication login console command. To revert to the default, use the no form of this command.
aaa authentication login console {group group-list } [none] | local | none }
no aaa authentication login console {group group-list [none] | local | none }
Specifies a space-separated list of server groups. The list can include the following: |
|
|
|
The group radius, group tacacs+, and group group-list methods refer to a set of previously defined RADIUS or TACACS+ servers. Use the radius-server host or tacacs-server host command to configure the host servers. Use the aaa group server command to create a named group of servers.
Use the show aaa group command to display the RADIUS server groups on the device.
If you specify more that one server group, the software checks each group in the order that you specify in the list.
If you specify the group method or local method and they fail, then the authentication can fail. If you specify the none method alone or after the group method, then the authentication always succeeds.
This example shows how to configure the AAA authentication console login methods:
This example shows how to revert to the default AAA authentication console login method:
|
|
---|---|
To configure the default AAA authentication methods, use the aaa authentication login default command. To revert to the default, use the no form of this command.
aaa authentication login default { group group-list } [ none ] | local | none }
no aaa authentication login default { group group-list [ none ] | local | none }
Specifies a server group list to be used for authentication. |
|
Space-separated list of server groups that can include the following: |
|
(Optional) Specifies to use the username for authentication. |
|
|
|
The group radius, group tacacs+, and group group-list methods refer to a set of previously defined RADIUS or TACACS+ servers. Use the radius-server host or tacacs-server host command to configure the host servers. Use the aaa group server command to create a named group of servers.
Use the show aaa group command to display the RADIUS server groups on the device.
If you specify more that one server group, the software checks each group in the order that you specify in the list.
If you specify the group method or local method and they fail, then the authentication fails. If you specify the none method alone or after the group method, then the authentication always succeeds.
This example shows how to configure the AAA authentication console login method:
This example shows how to revert to the default AAA authentication console login method:
|
|
---|---|
To configure an AAA authentication failure message to display on the console, use the aaa authentication login error-enable command. To remove the error message, use the no form of this command.
aaa authentication login error-enable
no aaa authentication login error-enable
|
|
If none of the remote AAA servers respond when a user logs in, the authentication is processed by the local user database. If you have enabled the display, one of the following message is generated for the user:
This example shows how to enable the display of AAA authentication failure messages to the console:
This example shows how to disable the display of AAA authentication failure messages to the console:
|
|
---|---|
Displays the status of the AAA authentication failure message display. |
To enable Microsoft Challenge Handshake Authentication Protocol (MSCHAP) authentication at login, use the aaa authentication login mschap command. To disable MSCHAP, use the no form of this command.
aaa authentication login mschap
no aaa authentication login mschap
|
|
This example shows how to enable MSCHAP authentication:
This example shows how to disable MSCHAP authentication:
|
|
---|---|
To create a RADIUS server group, use the aaa group server radius command. To delete a RADIUS server group, use the no form of this command.
aaa group server radius group-name
no aaa group server radius group-name
RADIUS server group name.The name is alphanumeric and case-sensitive. The maximum length is 64 characters. |
|
|
This example shows how to create a RADIUS server group and enter RADIUS Server Configuration mode for configuring the specified server group:
This example shows how to delete a RADIUS server group:
|
|
---|---|
To create a TACACS+ server group, use the aaa group server tacacs+ command. To delete a TACACS+ server group, use the no form of this command.
aaa group server tacacs+ group-name
no aaa group server tacacs+ group-name
TACACS+ server group name. The name is alphanumeric and case-sensitive. The maximum length is 64 characters. |
|
|
You must enable TACACS+ using the tacacs+ enable command before you can configure TACACS+.
This example shows how to create a TACACS+ server group:
This example shows how to delete a TACACS+ server group:
|
|
---|---|
To assign a port profile role to a specific port profile, use the assign port-profile-role command. To remove the role from the profile, use the no form of this command.
assign port-profile-role port-profile-role-name
no assign port-profile-role port-profile-role-name
port-profile configuration (config-port-profile)
|
|
This example shows how to assign a port profile role to a specific port profile:
This example shows how to remove a role from a port profile configuration:
To access the standby Virtual Supervisor Module (VSM) console from the active VSM, use the attach module command.
Number that identifies an existing module. The range is 1–66. |
|
|
This example shows how to attach to the console of the secondary VSM:
(
config)
# attach module 2
Although the allowable range of module numbers is from 1–66, only one value, 2, is operational.
|
|
---|---|
To execute any VEM command without logging into the VEM, use the attach vem command. By using the attach vem command, you can get into the VEM and execute all the VEM commands.
Number that identifies an existing module. The range is 3–130. |
|
|
(
config)
# attach vem 4
|
|
---|---|