Controlling Management Access 211Configuring and Applying Authentication ProfilesBeginning in Privileged EXEC mode, use the following commands to createan authentication list, configure the authentication methods for that list, andapply the list to an access method.Command Purposeconfigure Enter Global Configuration mode.aaa authentication login{default|list-name}method1 [method2...]Configure the methods used to authenticate a userattempting to log onto the switch management interface.The command configures the default list or creates a newauthentication list and defines its authentication methods.• default — Uses the listed authentication methods thatfollow this argument as the default list of methods whena user logs in.•list-name — Character string used to name the list ofauthentication methods activated when a user logs in.(Range: 1-12 characters)•method1 [method2...] — Specify at least one methodfrom the following list:– enable– line– local– none– radius– tacacsNOTE: The additional methods of authentication are usedonly if the previous method returns an error, not if there is anauthentication failure. To ensure that the authenticationsucceeds even if all methods return an error, specify none asthe final method in the command line. For example, if none isspecified as an authentication method after radius, noauthentication is used if the RADIUS server is down.aaa authenticationenable {default|list-name}method1[method2...]Configure the authentication for accessing PrivilegedEXEC mode and higher privilege levels. See the previouscommand for information about the keywords, variables,and usage.