and different users. In Dell Networking OS, AAA uses a list of authentication methods, called method lists,
to define the types of authentication and the sequence in which they are applied. You can define a
method list or use the default method list. User-defined method lists take precedence over the default
method list.
NOTE: If a console user logs in with RADIUS authentication, the privilege level is applied from the
RADIUS server if the privilege level is configured for that user in RADIUS, whether you configure
RADIUS authorization.
NOTE: RADIUS and TACACS servers support VRF-awareness functionality. You can create RADIUS
and TACACS groups and then map multiple servers to a group. The group to which you map
multiple servers is bound to a single VRF.
Configuration Task List for AAA Authentication
The following sections provide the configuration tasks.
•
Configure Login Authentication for Terminal Lines
•
Configuring AAA Authentication Login Methods
•
For a complete list of all commands related to login authentication, refer to the
Security
chapter in the
Dell Networking OS Command Reference Guide
.
Configure Login Authentication for Terminal Lines
You can assign up to five authentication methods to a method list. Dell Networking OS evaluates the
methods in the order in which you enter them in each list.
If the first method list does not respond or returns an error, Dell Networking OS applies the next method
list until the user either passes or fails the authentication. If the user fails a method list, Dell Networking
OS does not apply the next method list.
Configuring AAA Authentication Login Methods
To configure an authentication method and method list, use the following commands.
Dell Networking OS Behavior
: If you use a method list on the console port in which RADIUS or TACACS
is the last authentication method, and the server is not reachable, Dell Networking OS allows access even
though the username and password credentials cannot be verified. Only the console port behaves this
way, and does so to ensure that users are not locked out of the system if network-wide issue prevents
access to these servers.
1.
Define an authentication method-list (
method-list-name
) or specify the default.
CONFIGURATION mode
aaa authentication login {
method-list-name
| default}
method1
[
... method4
]
The default method-list is applied to all terminal lines.
Possible methods are:
•
enable
: use the password you defined using the
enable secret
or
enable password
command in CONFIGURATION mode.
858
Security
Summary of Contents for S4820T
Page 1: ...Dell Configuration Guide for the S4820T System 9 8 0 0 ...
Page 282: ...Dell 282 Control Plane Policing CoPP ...
Page 622: ...Figure 81 Configuring Interfaces for MSDP 622 Multicast Source Discovery Protocol MSDP ...
Page 623: ...Figure 82 Configuring OSPF and BGP for MSDP Multicast Source Discovery Protocol MSDP 623 ...
Page 629: ...Figure 86 MSDP Default Peer Scenario 2 Multicast Source Discovery Protocol MSDP 629 ...
Page 630: ...Figure 87 MSDP Default Peer Scenario 3 630 Multicast Source Discovery Protocol MSDP ...
Page 751: ...10 11 5 2 00 00 05 00 02 04 Member Ports Te 1 2 1 PIM Source Specific Mode PIM SSM 751 ...
Page 905: ...Figure 112 Single and Double Tag First byte TPID Match Service Provider Bridging 905 ...
Page 979: ...6 Member not present 7 Member not present Stacking 979 ...
Page 981: ...storm control Storm Control 981 ...
Page 1103: ...Figure 134 Setup OSPF and Static Routes Virtual Routing and Forwarding VRF 1103 ...