Configuring AAA
This section describes the tasks for configuring AAA on Cisco NX-OS devices.
If you are familiar with the Cisco IOS CLI, be aware that the Cisco NX-OS commands for this feature might
differ from the Cisco IOS commands that you would use.
Note
Cisco Nexus 9K Series switches support the CLI command, aaa authentication login ascii-authentication, only
for , but not for RADIUS. Ensure that you have disabled aaa authentication login ascii-authentication
switch so that the default authentication, PAP, is enabled. Otherwise, you will see syslog errors.
Note
Process for Configuring AAA
Follow these steps to configure AAA authentication and accounting:
1.
If you want to use remote RADIUS, , or LDAP servers for authentication, configure the hosts
on your Cisco NX-OS device.
2.
Configure console login authentication methods.
3.
Configure default login authentication methods for user logins.
4.
Configure default AAA accounting default methods.
Configuring Console Login Authentication Methods
This section describes how to configure the authentication methods for the console login.
The authentication methods include the following:
• Global pool of RADIUS servers
• Named subset of RADIUS, , or LDAP servers
• Local database on the Cisco NX-OS device
• Username only (none)
The default method is local, but you have the option to disable it.
The
group radius
and
group server-name
forms of the
aaa authentication
command refer to a set of
previously defined RADIUS servers. Use the
radius-server host
command to configure the host servers.
Use the
aaa group server radius
command to create a named group of servers.
Note
Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x
15
Configuring AAA
Configuring AAA