Example of the
show accounting
Command for AAA Accounting
Dell#show accounting
Active accounted actions on tty2, User admin Priv 1
Task ID 1, EXEC Accounting record, 00:00:39 Elapsed, service=shell
Active accounted actions on tty3, User admin Priv 1
Task ID 2, EXEC Accounting record, 00:00:26 Elapsed, service=shell
Dell#
AAA Authentication
Dell Networking OS supports a distributed client/server system implemented through authentication,
authorization, and accounting (AAA) to help secure networks against unauthorized access.
In the Dell Networking implementation, the Dell Networking system acts as a RADIUS or client and
sends authentication requests to a central remote authentication dial-in service (RADIUS) or Terminal access
controller access control system plus () server that contains all user authentication and network
service access information.
Dell Networking uses local usernames/passwords (stored on the Dell Networking system) or AAA for login
authentication. With AAA, you can specify the security protocol or mechanism for different login methods and
different users. In Dell Networking OS, AAA uses a list of authentication methods, called method lists, to
define the types of authentication and the sequence in which they are applied. You can define a method list
or use the default method list. User-defined method lists take precedence over the default method list.
NOTE:
If a console user logs in with RADIUS authentication, the privilege level is applied from the RADIUS
server if the privilege level is configured for that user in RADIUS, whether you configure RADIUS
authorization.
NOTE:
RADIUS and TACACS servers support VRF-awareness functionality. You can create RADIUS and
TACACS groups and then map multiple servers to a group. The group to which you map multiple servers
is bound to a single VRF.
Configuration Task List for AAA Authentication
The following sections provide the configuration tasks.
•
Configuring AAA Authentication Login Methods
•
•
Enabling AAA Authentication - RADIUS
For a complete list of all commands related to login authentication, refer to the
Security
chapter in the
Dell
Networking OS Command Reference Guide
.
Configure Login Authentication for Terminal Lines
You can assign up to five authentication methods to a method list. Dell Networking OS evaluates the methods
in the order in which you enter them in each list.
If the first method list does not respond or returns an error, Dell Networking OS applies the next method list
until the user either passes or fails the authentication. If the user fails a method list, Dell Networking OS does
not apply the next method list.
Security
906
Summary of Contents for S4048T
Page 1: ...Dell Configuration Guide for the S4048T ON System 9 10 0 1 ...
Page 98: ... saveenv 7 Reload the system uBoot mode reset Management 98 ...
Page 113: ...Total CFM Pkts 10303 CCM Pkts 0 LBM Pkts 0 LTM Pkts 3 LBR Pkts 0 LTR Pkts 0 802 1ag 113 ...
Page 411: ...mode transit no disable Force10 Resilient Ring Protocol FRRP 411 ...
Page 590: ...Figure 67 Inspecting the LAG Configuration Link Aggregation Control Protocol LACP 590 ...
Page 646: ...Figure 87 Configuring Interfaces for MSDP Multicast Source Discovery Protocol MSDP 646 ...
Page 647: ...Figure 88 Configuring OSPF and BGP for MSDP Multicast Source Discovery Protocol MSDP 647 ...
Page 653: ...Figure 91 MSDP Default Peer Scenario 2 Multicast Source Discovery Protocol MSDP 653 ...
Page 654: ...Figure 92 MSDP Default Peer Scenario 3 Multicast Source Discovery Protocol MSDP 654 ...
Page 955: ...Figure 119 Single and Double Tag First byte TPID Match Service Provider Bridging 955 ...