•
level-number
: The level-number you wish to set.
If you enter
disable
without a level-number, your security level is 1.
RADIUS
Remote authentication dial-in user service (RADIUS) is a distributed client/server protocol.
This protocol transmits authentication, authorization, and configuration information between a central
RADIUS server and a RADIUS client (the Dell Networking system). The system sends user information to the
RADIUS server and requests authentication of the user and password. The RADIUS server returns one of the
following responses:
•
Access-Accept
— the RADIUS server authenticates the user.
•
Access-Reject
— the RADIUS server does not authenticate the user.
If an error occurs in the transmission or reception of RADIUS packets, you can view the error by enabling the
debug radius
command.
Transactions between the RADIUS server and the client are encrypted (the users’ passwords are not sent in
plain text). RADIUS uses UDP as the transport protocol between the RADIUS server host and the client.
For more information about RADIUS, refer to RFC 2865,
Remote Authentication Dial-in User Service
.
RADIUS Authentication
Dell Networking OS supports RADIUS for user authentication (text password) at login and can be specified as
one of the login authentication methods in the
aaa authentication login
command.
When configuring AAA authorization, you can configure to limit the attributes of services available to a user.
When you enable authorization, the network access server uses configuration information from the user
profile to issue the user's session. The user’s access is limited based on the configuration attributes. RADIUS
exec-authorization stores a user-shell profile and that is applied during user login. You may name the relevant
named-lists with either a unique name or the default name. When you enable authorization by the RADIUS
server, the server returns the following information to the client:
•
•
•
•
After gaining authorization for the first time, you may configure these attributes.
NOTE:
RADIUS authentication/authorization is done for every login. There is no difference between first-
time login and subsequent logins.
Security
915
Summary of Contents for S4048T
Page 1: ...Dell Configuration Guide for the S4048T ON System 9 10 0 1 ...
Page 98: ... saveenv 7 Reload the system uBoot mode reset Management 98 ...
Page 113: ...Total CFM Pkts 10303 CCM Pkts 0 LBM Pkts 0 LTM Pkts 3 LBR Pkts 0 LTR Pkts 0 802 1ag 113 ...
Page 411: ...mode transit no disable Force10 Resilient Ring Protocol FRRP 411 ...
Page 590: ...Figure 67 Inspecting the LAG Configuration Link Aggregation Control Protocol LACP 590 ...
Page 646: ...Figure 87 Configuring Interfaces for MSDP Multicast Source Discovery Protocol MSDP 646 ...
Page 647: ...Figure 88 Configuring OSPF and BGP for MSDP Multicast Source Discovery Protocol MSDP 647 ...
Page 653: ...Figure 91 MSDP Default Peer Scenario 2 Multicast Source Discovery Protocol MSDP 653 ...
Page 654: ...Figure 92 MSDP Default Peer Scenario 3 Multicast Source Discovery Protocol MSDP 654 ...
Page 955: ...Figure 119 Single and Double Tag First byte TPID Match Service Provider Bridging 955 ...