radius-server host x.x.x.x key some-password
3.
Establish a host address and password.
CONFIGURATION mode
tacacs-server host x.x.x.x key some-password
Examples of the
enable
commands for RADIUS
To get
enable authentication
from the RADIUS server and use TACACS as a backup, issue the
following commands.
The following example shows enabling authentication from the RADIUS server.
Dell(config)# aaa authentication enable default radius tacacs
Radius and TACACS server has to be properly setup for this.
Dell(config)# radius-server host x.x.x.x key <some-password>
Dell(config)# tacacs-server host x.x.x.x key <some-password>
To use local authentication for
enable secret
on the console, while using remote authentication on
VTY lines, issue the following commands.
The following example shows enabling local authentication for console and remote authentication for
the VTY lines.
Dell(config)# aaa authentication enable mymethodlist radius tacacs
Dell(config)# line vty 0 9
Dell(config-line-vty)# enable authentication mymethodlist
Server-Side Configuration
•
— When using , Dell Networking sends an initial packet with service type
SVC_ENABLE, and then sends a second packet with just the password. The TACACS server must have
an entry for username $enable$.
•
RADIUS
— When using RADIUS authentication, FTOS sends an authentication packet with the
following:
Username: $enab15$
Password: <password-entered-by-user>
Therefore, the RADIUS server must have an entry for this username.
Obscuring Passwords and Keys
By default, the
service password-encryption
command stores encrypted passwords. For greater
security, you can also use the
service obscure-passwords
command to prevent a user from reading
the passwords and keys, including RADIUS, keys, router authentication strings, VRRP
authentication by obscuring this information. Passwords and keys are stored encrypted in the
configuration file and by default are displayed in the encrypted form when the configuration is displayed.
Enabling the
service obscure-passwords
command displays asterisks instead of the encrypted
passwords and keys. This command prevents a user from reading these passwords and keys by obscuring
this information with asterisks.
Password obscuring masks the password and keys for display only but does not change the contents of
the file. The string of asterisks is the same length as the encrypted string for that line of configuration. To
860
Security
Summary of Contents for S4820T
Page 1: ...Dell Configuration Guide for the S4820T System 9 8 0 0 ...
Page 282: ...Dell 282 Control Plane Policing CoPP ...
Page 622: ...Figure 81 Configuring Interfaces for MSDP 622 Multicast Source Discovery Protocol MSDP ...
Page 623: ...Figure 82 Configuring OSPF and BGP for MSDP Multicast Source Discovery Protocol MSDP 623 ...
Page 629: ...Figure 86 MSDP Default Peer Scenario 2 Multicast Source Discovery Protocol MSDP 629 ...
Page 630: ...Figure 87 MSDP Default Peer Scenario 3 630 Multicast Source Discovery Protocol MSDP ...
Page 751: ...10 11 5 2 00 00 05 00 02 04 Member Ports Te 1 2 1 PIM Source Specific Mode PIM SSM 751 ...
Page 905: ...Figure 112 Single and Double Tag First byte TPID Match Service Provider Bridging 905 ...
Page 979: ...6 Member not present 7 Member not present Stacking 979 ...
Page 981: ...storm control Storm Control 981 ...
Page 1103: ...Figure 134 Setup OSPF and Static Routes Virtual Routing and Forwarding VRF 1103 ...