Configuration Guide
AAA Configuration
Caution
When the specific method list is applied, if no named method list is clearly
specified, the default authentication method list will apply.
As a result, if you do not want to use the default authentication method list, you
shall specify a specific method list.
For complete descriptions of the commands mentioned in this chapter, see the related
chapters in the
Security Configuration Command Reference
.
Enabling AAA
It is required to enable AAA first to be able to use the AAA security features.
To enable AAA, execute the following command in the global configuration mode:
Command
Function
Ruijie(config)#
aaa new-model
Enable AAA
Disabling AAA
To disable AAA, execute the following command in the global configuration mode:
Command
Function
Ruijie(config)#
no aaa new-model
Disable AAA
Sequential Configuration Steps
After the AAA is enabled, it is time to configure the other parts related with the selected
security solutions. Following table lists the possible configuration tasks and their description
chapters.
Methods of AAA access control security solution
Configuration task
Step
Chapter
Configuring Local Login Authentication
3
Configuring Authentication
Defining AAA Authentication Method List 3
Configuring Authentication
Applying Method List on Specific
Interface or Line
4
Configuring Authentication
Configuring Radius Security Protocol
Parameters
2
Configuring Radius
Enabling Radius Authorization
5
Configuring Authorization
If you are using AAA for authentication, see
Configuring Authentication
.
Summary of Contents for RG-S2900G-E Series
Page 1: ...RG S2900G E Series Switch RGOS Configuration Guide Release 10 4 2b12 p1 ...
Page 91: ...Configuration Guide Configuring PoE Configuration ...
Page 133: ...Configuration Guide EEE Configuration ...
Page 319: ...Configuration Guide QinQ Configuration ...
Page 408: ......
Page 409: ...IP Routing Configuration 1 Static Route Configuration ...
Page 412: ......
Page 413: ...Multicast Configuration 1 IGMP Snooping Configuration 2 MLD Snooping Configuration ...
Page 757: ......
Page 758: ...ACL QoS Configuration 1 Access Control List Configuration 2 QoS Configuration ...
Page 801: ...Reliability Configuration 1 RLDP Configuration 2 TPP Configuration 3 SEM Configuration ...
Page 901: ...Configuration Guide ERSPAN Configuration ...
Page 902: ...Web based Configuration 1 Web based Configuration ...