4
Log in to switch using console or telnet or ssh with a valid user role.
When 1-factor authentication is used, the authentication succeeds enabling you to access the switch. When two-factor authentication is
used, the system prompts you to enter a one-time password as a second step of authentication. If a valid one-time password is supplied,
the authentication succeeds enabling you to access the switch.
Dell Networking OS supports terminal access controller access control system ( client, including support for login authentication.
Configuration Task List for
The following list includes the configuration task for functions.
•
Choosing as the Authentication Method
•
•
•
For a complete listing of all commands related to , refer to the
Security
chapter in the
Dell Networking OS Command Reference
Guide
.
Choosing as the Authentication Method
One of the login authentication methods available is and the user’s name and password are sent for authentication to the
TACACS hosts specified.
To use to authenticate users, specify at least one server for the system to communicate with and configure
as one of your authentication methods.
To select as the login authentication method, use the following commands.
1
Configure a server host.
CONFIGURATION mode
tacacs-server host {
ip-address
|
host
}
Enter the IP address or host name of the server.
Use this command multiple times to configure multiple server hosts.
2
Enter a text string (up to 16 characters long) as the name of the method list you wish to use with the TACAS+ authentication method.
CONFIGURATION mode
aaa authentication login {
method-list-name
| default} [
...method3
]
The method must not be the last method specified.
3
Enter LINE mode.
CONFIGURATION mode
line {aux 0 | console 0 | vty
number
[
end-number
]}
4
Assign the
method-list
to the terminal line.
LINE mode
login authentication {
method-list-name
| default}
712
Security
Summary of Contents for S3048-ON
Page 1: ...Dell Configuration Guide for the S3048 ON System 9 11 2 5 ...
Page 137: ...0 Gi 1 1 Gi 1 2 rx Flow N A N A 0 0 No N A N A yes Access Control Lists ACLs 137 ...
Page 142: ...Figure 10 BFD Three Way Handshake State Changes 142 Bidirectional Forwarding Detection BFD ...
Page 241: ...Dell Control Plane Policing CoPP 241 ...
Page 287: ... RPM Synchronization GARP VLAN Registration Protocol GVRP 287 ...
Page 428: ...Figure 53 Inspecting the LAG Configuration 428 Link Aggregation Control Protocol LACP ...
Page 477: ...Figure 73 Configuring Interfaces for MSDP Multicast Source Discovery Protocol MSDP 477 ...
Page 478: ...Figure 74 Configuring OSPF and BGP for MSDP 478 Multicast Source Discovery Protocol MSDP ...
Page 483: ...Figure 77 MSDP Default Peer Scenario 2 Multicast Source Discovery Protocol MSDP 483 ...
Page 484: ...Figure 78 MSDP Default Peer Scenario 3 484 Multicast Source Discovery Protocol MSDP ...
Page 745: ...Figure 104 Single and Double Tag TPID Match Service Provider Bridging 745 ...
Page 746: ...Figure 105 Single and Double Tag First byte TPID Match 746 Service Provider Bridging ...