•
(optional)
For a complete listing of all Dell Networking OS commands related to RADIUS, refer to the
Security
chapter in the
Dell Networking OS
Command Reference Guide
.
NOTE:
RADIUS authentication and authorization are done in a single step. Hence, authorization cannot be used independent of
authentication. However, if you have configured RADIUS authorization and have not configured authentication, a message is
logged stating this. During authorization, the next method in the list (if present) is used, or if another method is not present, an
error is reported.
To view the configuration, use the
show config
in LINE mode or the
show running-config
command in EXEC Privilege mode.
Defining a AAA Method List to be Used for RADIUS
To configure RADIUS to authenticate or authorize users on the system, create a AAA method list.
Default method lists do not need to be explicitly applied to the line, so they are not mandatory.
To create a method list, use the following commands.
•
Enter a text string (up to 16 characters long) as the name of the method list you wish to use with the RADIUS authentication method.
CONFIGURATION mode
aaa authentication login
method-list-name
radius
•
Create a method list with RADIUS and as authorization methods.
CONFIGURATION mode
aaa authorization exec {
method-list-name
| default} radius
Typical order of methods: RADIUS, , Local, None.
If RADIUS denies authorization, the session ends (RADIUS must not be the last method specified).
Applying the Method List to Terminal Lines
To enable RADIUS AAA login authentication for a method list, apply it to a terminal line.
To configure a terminal line for RADIUS authentication and authorization, use the following commands.
•
Enter LINE mode.
CONFIGURATION mode
line {aux 0 | console 0 | vty
number
[
end-number
]}
•
Enable AAA login authentication for the specified RADIUS method list.
LINE mode
login authentication {
method-list-name
| default}
This procedure is mandatory if you are not using default lists.
•
To use the method list.
CONFIGURATION mode
authorization exec methodlist
Security
805
Summary of Contents for S4048T-ON
Page 1: ...Dell Configuration Guide for the S4048 ON System 9 11 2 1 ...
Page 148: ...Figure 10 BFD Three Way Handshake State Changes 148 Bidirectional Forwarding Detection BFD ...
Page 251: ...Dell Control Plane Policing CoPP 251 ...
Page 363: ... RPM Synchronization GARP VLAN Registration Protocol GVRP 363 ...
Page 511: ...Figure 64 Inspecting the LAG Configuration Link Aggregation Control Protocol LACP 511 ...
Page 558: ...Figure 84 Configuring Interfaces for MSDP 558 Multicast Source Discovery Protocol MSDP ...
Page 559: ...Figure 85 Configuring OSPF and BGP for MSDP Multicast Source Discovery Protocol MSDP 559 ...
Page 564: ...Figure 88 MSDP Default Peer Scenario 2 564 Multicast Source Discovery Protocol MSDP ...
Page 565: ...Figure 89 MSDP Default Peer Scenario 3 Multicast Source Discovery Protocol MSDP 565 ...
Page 841: ...Figure 115 Single and Double Tag TPID Match Service Provider Bridging 841 ...
Page 842: ...Figure 116 Single and Double Tag First byte TPID Match 842 Service Provider Bridging ...