Dell Networking OS can assign different access classes to different users by username. Until users attempt to
log in, Dell Networking OS does not know if they will be assigned a VTY line. This means that incoming users
always see a login prompt even if you have excluded them from the VTY line with a deny-all access class.
After users identify themselves, Dell Networking OS retrieves the access class from the local database and
applies it. (Dell Networking OS then can close the connection if a user is denied access.)
NOTE:
If a VTY user logs in with RADIUS authentication, the privilege level is applied from the RADIUS
server only if you configure RADIUS authentication.
The following example shows how to allow or deny a Telnet connection to a user. Users see a login prompt
even if they cannot log in. No access class is configured for the VTY line. It defaults from the local database.
Example of Configuring VTY Authorization Based on Access Class Retrieved from a Local Database (Per
User)
Dell(conf)#user gooduser password abc privilege 10 access-class permitall
Dell(conf)#user baduser password abc privilege 10 access-class denyall
Dell(conf)#
Dell(conf)#aaa authentication login localmethod local
Dell(conf)#
Dell(conf)#line vty 0 9
Dell(config-line-vty)#login authentication localmethod
Dell(config-line-vty)#end
VTY Line Remote Authentication and
Authorization
Dell Networking OS retrieves the access class from the VTY line.
The Dell Networking OS takes the access class from the VTY line and applies it to ALL users. Dell Networking
OS does not need to know the identity of the incoming user and can immediately apply the access class. If
the authentication method is RADIUS, , or line, and you have configured an access class for the VTY
line, Dell Networking OS immediately applies it. If the access-class is set to deny all or deny for the incoming
subnet, Dell Networking OS closes the connection without displaying the login prompt. The following
example shows how to deny incoming connections from subnet 10.0.0.0 without displaying a login prompt.
The example uses as the authentication mechanism.
Example of Configuring VTY Authorization Based on Access Class Retrieved from the Line (Per Network
Address)
Dell(conf)#ip access-list standard deny10
Dell(conf-ext-nacl)#permit 10.0.0.0/8
Dell(conf-ext-nacl)#deny any
Dell(conf)#
Dell(conf)#aaa authentication login tacacsmethod
Dell(conf)#tacacs-server host 256.1.1.2 key Force10
Dell(conf)#
Dell(conf)#line vty 0 9
Dell(config-line-vty)#login authentication tacacsmethod
Dell(config-line-vty)#
Dell(config-line-vty)#access-class deny10
Dell(config-line-vty)#end
(same applies for radius and line authentication)
Security
933
Summary of Contents for S4048T
Page 1: ...Dell Configuration Guide for the S4048T ON System 9 10 0 1 ...
Page 98: ... saveenv 7 Reload the system uBoot mode reset Management 98 ...
Page 113: ...Total CFM Pkts 10303 CCM Pkts 0 LBM Pkts 0 LTM Pkts 3 LBR Pkts 0 LTR Pkts 0 802 1ag 113 ...
Page 411: ...mode transit no disable Force10 Resilient Ring Protocol FRRP 411 ...
Page 590: ...Figure 67 Inspecting the LAG Configuration Link Aggregation Control Protocol LACP 590 ...
Page 646: ...Figure 87 Configuring Interfaces for MSDP Multicast Source Discovery Protocol MSDP 646 ...
Page 647: ...Figure 88 Configuring OSPF and BGP for MSDP Multicast Source Discovery Protocol MSDP 647 ...
Page 653: ...Figure 91 MSDP Default Peer Scenario 2 Multicast Source Discovery Protocol MSDP 653 ...
Page 654: ...Figure 92 MSDP Default Peer Scenario 3 Multicast Source Discovery Protocol MSDP 654 ...
Page 955: ...Figure 119 Single and Double Tag First byte TPID Match Service Provider Bridging 955 ...