The 'group' keyword is only used when referencing a server group.
The authentication list did not include a fallback method for authentication (a fallback method in this case would be a RADIUS server or the local directory).
As an example of using redundancy in authentication: 'aaa authentication login default tacacs+ local'. This command creates an authentication list named default that uses a TACACS+ server as the primary method for authentication and the local directory as a secondary method if the primary method fails.
Applied configuration has invalid syntax:
suppose to type "group" before specifying RADIUS or TACACS+
when creating an authentication method
aaa authentication login authorizationlist ?
cache Use Cached-group
enable Use enable password for authentication.
group Use Server-group
krb5 Use Kerberos 5 authentication.
krb5-telnet Allow logins only if already authenticated via Kerberos V
Telnet.
line Use line password for authentication.
local Use local username authentication.
local-case Use case-sensitive local username authentication.
none NO authentication.
passwd-expiry enable the login list to provide password aging support
When login is indicated in the aaa authentication method, any passwords in the VTY will be ignored. So this removes A from the equation.
C is wrong because it says only users at 192.168.0.202. That implies they are attempting to telnet/ssh from that server, that IP is an authentication server for TACACS+ not a source connection.
D is wrong because only TACACS+ is listed in the AAA string. There is no fall-back method
B is correct because all users are forced to authenticate against TACACS+ only.
There question is constructed incorrectly coz there are no such commands in cli: aaa authentication login authorizationlist tacacs+. After user list "authorizationlist" you have to describe that it is a group and then method radius/tac.
aaa authentication login authorizationlist group tacacs+
The user group is known by tacacs+ server whos IP is - 192.168.0.202
So the answer should be: C
There is such a command... you need to first put in aaa new-model to activate AAA Authentication.
SW1(config)#aaa new-model
SW1(config)#authentication login authorizationlist tacacs+
SW1config)#do show run | i aaa
Building configuration...
aaa new-model
aaa authentication login authorizationlist group tacacs+
aaa session-id common
This section is not available anymore. Please use the main Exam Page.350-401 Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
AbdullahMohammad251
8 months, 1 week ago[Removed]
11 months, 1 week agokldoyle97
1 year, 3 months agomgiuseppe86
1 year, 7 months agomgiuseppe86
1 year, 7 months agodudalykai
1 year, 8 months agomgiuseppe86
1 year, 7 months agoRamazanLokov
1 year, 11 months agodragonwise
2 years ago[Removed]
3 years, 11 months ago