NOTE:
If a console user logs in with RADIUS authentication, the privilege level is applied from the RADIUS server if the privilege
level is configured for that user in RADIUS, whether you configure RADIUS authorization.
NOTE:
RADIUS and TACACS servers support VRF-awareness functionality. You can create RADIUS and TACACS groups and
then map multiple servers to a group. The group to which you map multiple servers is bound to a single VRF.
Configuration Task List for AAA Authentication
The following sections provide the configuration tasks.
•
Configuring AAA Authentication Login Methods
•
•
Enabling AAA Authentication - RADIUS
For a complete list of all commands related to login authentication, refer to the
Security
chapter in the
Dell Networking OS Command
Reference Guide
.
Configure Login Authentication for Terminal Lines
You can assign up to five authentication methods to a method list. Dell Networking OS evaluates the methods in the order in which you
enter them in each list.
If the first method list does not respond or returns an error, Dell Networking OS applies the next method list until the user either passes or
fails the authentication. If the user fails a method list, Dell Networking OS does not apply the next method list.
Configuring AAA Authentication Login Methods
To configure an authentication method and method list, use the following commands.
Dell Networking OS Behavior
: If you use a method list on the console port in which RADIUS or TACACS is the last authentication method,
and the server is not reachable, Dell Networking OS allows access even though the username and password credentials cannot be verified.
Only the console port behaves this way, and does so to ensure that users are not locked out of the system if network-wide issue prevents
access to these servers.
1
Define an authentication method-list (
method-list-name
) or specify the default.
CONFIGURATION mode
aaa authentication login {
method-list-name
| default}
method1
[
... method4
]
The default method-list is applied to all terminal lines.
Possible methods are:
•
enable
: use the password you defined using the
enable secret
,
enable password
, or
enable sha256-password
command in CONFIGURATION mode. In general, the
enable secret
command overrules the
enable password
command.
If you configure the
enable sha256-password
command, it overrules both the
enable secret
and
enable password
commands.
•
line
: use the password you defined using the
password
command in LINE mode.
•
local
: use the username/password database defined in the local configuration.
•
none
: no authentication.
•
radius
: use the RADIUS servers configured with the radius-server host command.
•
: use the servers configured with the
tacacs-server host
command.
2
Enter LINE mode.
CONFIGURATION mode
line {aux 0 | console 0 | vty
number
[
... end-number
]}
Security
699
Summary of Contents for S3048-ON
Page 1: ...Dell Configuration Guide for the S3048 ON System 9 11 2 5 ...
Page 137: ...0 Gi 1 1 Gi 1 2 rx Flow N A N A 0 0 No N A N A yes Access Control Lists ACLs 137 ...
Page 142: ...Figure 10 BFD Three Way Handshake State Changes 142 Bidirectional Forwarding Detection BFD ...
Page 241: ...Dell Control Plane Policing CoPP 241 ...
Page 287: ... RPM Synchronization GARP VLAN Registration Protocol GVRP 287 ...
Page 428: ...Figure 53 Inspecting the LAG Configuration 428 Link Aggregation Control Protocol LACP ...
Page 477: ...Figure 73 Configuring Interfaces for MSDP Multicast Source Discovery Protocol MSDP 477 ...
Page 478: ...Figure 74 Configuring OSPF and BGP for MSDP 478 Multicast Source Discovery Protocol MSDP ...
Page 483: ...Figure 77 MSDP Default Peer Scenario 2 Multicast Source Discovery Protocol MSDP 483 ...
Page 484: ...Figure 78 MSDP Default Peer Scenario 3 484 Multicast Source Discovery Protocol MSDP ...
Page 745: ...Figure 104 Single and Double Tag TPID Match Service Provider Bridging 745 ...
Page 746: ...Figure 105 Single and Double Tag First byte TPID Match 746 Service Provider Bridging ...