You are on page 1of 1

At this point, with a method list configured for authentication and a second method

list con-
figured for authorization, it is time to put those method lists to work. Now what
does that
mean? Currently, those method lists are just wasting space in the configuration. If
you want
those method lists to be used, you need to specifically apply those methods lists.
Based on
the policy, you want the method list for authentication and the method list for
authorization
to both be applied to the vty lines of the router.

Using a similar process as you did with the first method list, you choose User
Defined
(meaning that you are not going to set this method as the global default, but
instead are only
creating a method list that will not be used until this method list is associated
somewhere
else in the configuration, such as configured on a vty line). In addition to naming
the autho-
rization method list, you also click the Add button from this pop-up to select the
individual
methods to be used. Just as before, you click the OK button and any other
confirmation but-
tons presented until CCP finally delivers the configuration to the router, at which
point you
can see a summary of your authorization method list, as shown in Figure 3-5.
At this point, with a method list configured for authentication and a second method
list con-
figured for authorization, it is time to put those method lists to work. Now what
does that
mean? Currently, those method lists are just wasting space in the configuration. If
you want
those method lists to be used, you need to specifically apply those methods lists.
Based on
the policy, you want the method list for authentication and the method list for
authorization
to both be applied to the vty lines of the router.
To apply the method lists, we leave the AAA section and go to Configure > Router >
Router
Access > VTY. From there, click Edit and use the drop-down box to select the method
lists
that we want to use. The only method lists that exist for authentication and
authorization are
the ones that you create. In this case, we select the authentication and
authorization method
lists that we previously created, as shown in Figure 3-6.

You might also like