NOTE:
If a console user logs in with RADIUS authentication, the privilege level is applied from the RADIUS server if the privilege
level is configured for that user in RADIUS, whether you configure RADIUS authorization.
NOTE:
RADIUS and TACACS servers support VRF-awareness functionality. You can create RADIUS and TACACS groups and
then map multiple servers to a group. The group to which you map multiple servers is bound to a single VRF.
Configuration Task List for AAA Authentication
The following sections provide the configuration tasks.
•
Configuring AAA Authentication Login Methods
•
•
Enabling AAA Authentication - RADIUS
For a complete list of all commands related to login authentication, refer to the
Security
chapter in the
Dell Networking OS Command
Reference Guide
.
Configure Login Authentication for Terminal Lines
You can assign up to five authentication methods to a method list. Dell Networking OS evaluates the methods in the order in which you
enter them in each list.
If the first method list does not respond or returns an error, Dell Networking OS applies the next method list until the user either passes or
fails the authentication. If the user fails a method list, Dell Networking OS does not apply the next method list.
Configuring AAA Authentication Login Methods
To configure an authentication method and method list, use the following commands.
Dell Networking OS Behavior
: If you use a method list on the console port in which RADIUS or TACACS is the last authentication method,
and the server is not reachable, Dell Networking OS allows access even though the username and password credentials cannot be verified.
Only the console port behaves this way, and does so to ensure that users are not locked out of the system if network-wide issue prevents
access to these servers.
1
Define an authentication method-list (
method-list-name
) or specify the default.
CONFIGURATION mode
aaa authentication login {
method-list-name
| default}
method1
[
... method4
]
The default method-list is applied to all terminal lines.
Possible methods are:
•
enable
: use the password you defined using the
enable secret
,
enable password
, or
enable sha256-password
command in CONFIGURATION mode. In general, the
enable secret
command overrules the
enable password
command.
If you configure the
enable sha256-password
command, it overrules both the
enable secret
and
enable password
commands.
•
line
: use the password you defined using the
password
command in LINE mode.
•
local
: use the username/password database defined in the local configuration.
•
none
: no authentication.
•
radius
: use the RADIUS servers configured with the radius-server host command.
•
: use the servers configured with the
tacacs-server host
command.
2
Enter LINE mode.
CONFIGURATION mode
line {aux 0 | console 0 | vty
number
[
... end-number
]}
Security
795
Summary of Contents for S4048T-ON
Page 1: ...Dell Configuration Guide for the S4048 ON System 9 11 2 1 ...
Page 148: ...Figure 10 BFD Three Way Handshake State Changes 148 Bidirectional Forwarding Detection BFD ...
Page 251: ...Dell Control Plane Policing CoPP 251 ...
Page 363: ... RPM Synchronization GARP VLAN Registration Protocol GVRP 363 ...
Page 511: ...Figure 64 Inspecting the LAG Configuration Link Aggregation Control Protocol LACP 511 ...
Page 558: ...Figure 84 Configuring Interfaces for MSDP 558 Multicast Source Discovery Protocol MSDP ...
Page 559: ...Figure 85 Configuring OSPF and BGP for MSDP Multicast Source Discovery Protocol MSDP 559 ...
Page 564: ...Figure 88 MSDP Default Peer Scenario 2 564 Multicast Source Discovery Protocol MSDP ...
Page 565: ...Figure 89 MSDP Default Peer Scenario 3 Multicast Source Discovery Protocol MSDP 565 ...
Page 841: ...Figure 115 Single and Double Tag TPID Match Service Provider Bridging 841 ...
Page 842: ...Figure 116 Single and Double Tag First byte TPID Match 842 Service Provider Bridging ...