You are on page 1of 1

At this point, with a method list configured for authentication and a second method

list con-
figured for authorization, it is time to put those method lists to work. Now what
does that
mean? Currently, those method lists are just wasting space in the configuration. If
you want
those method lists to be used, you need to specifically apply those methods lists.
Based on
the policy, you want the method list for authentication and the method list for
authorization
to both be applied to the vty lines of the router.

You might also like