
CONFIGURATION mode
aaa authentication enable default radius tacacs
2.
Establish a host address and password.
CONFIGURATION mode
radius-server host x.x.x.x key some-password
3.
Establish a host address and password.
CONFIGURATION mode
tacacs-server host x.x.x.x key some-password
Examples of the
enable
commands for RADIUS
To get
enable authentication
from the RADIUS server and use TACACS as a backup, issue the following commands.
The following example shows enabling authentication from the RADIUS server.
Dell(config)# aaa authentication enable default radius tacacs
Radius and TACACS server has to be properly setup for this.
Dell(config)# radius-server host x.x.x.x key <some-password>
Dell(config)# tacacs-server host x.x.x.x key <some-password>
To use local authentication for
enable secret
on the console, while using remote authentication on VTY lines, issue the following
commands.
The following example shows enabling local authentication for console and remote authentication for the VTY lines.
Dell(config)# aaa authentication enable mymethodlist radius tacacs
Dell(config)# line vty 0 9
Dell(config-line-vty)# enable authentication mymethodlist
Server-Side Configuration
Using AAA authentication, the switch acts as a RADIUS or client to send authentication requests to a or
RADIUS server.
•
— When using , Dell Networking sends an initial packet with service type SVC_ENABLE, and then sends a
second packet with just the password. The TACACS server must have an entry for username $enable$.
•
RADIUS
— When using RADIUS authentication, FTOS sends an authentication packet with the following:
Username: $enab15$
Password: <password-entered-by-user>
Therefore, the RADIUS server must have an entry for this username.
Obscuring Passwords and Keys
By default, the
service password-encryption
command stores encrypted passwords. For greater security, you can also use
the
service obscure-passwords
command to prevent a user from reading the passwords and keys, including RADIUS,
keys, router authentication strings, VRRP authentication by obscuring this information. Passwords and keys are stored
encrypted in the configuration file and by default are displayed in the encrypted form when the configuration is displayed. Enabling
the
service obscure-passwords
command displays asterisks instead of the encrypted passwords and keys. This command
prevents a user from reading these passwords and keys by obscuring this information with asterisks.
Password obscuring masks the password and keys for display only but does not change the contents of the file. The string of
asterisks is the same length as the encrypted string for that line of configuration. To verify that you have successfully obscured
passwords and keys, use the
show running-config
command or
show startup-config
command.
If you are using role-based access control (RBAC), only the system administrator and security administrator roles can enable
the
service obscure-password
command.
Security
739
Содержание S4048-ON
Страница 1: ...Dell Configuration Guide for the S4048 ON System 9 9 0 0 ...
Страница 146: ...Figure 14 BFD Three Way Handshake State Changes 146 Bidirectional Forwarding Detection BFD ...
Страница 477: ...Figure 68 Inspecting Configuration of LAG 10 on ALPHA Link Aggregation Control Protocol LACP 477 ...
Страница 480: ...Figure 70 Inspecting a LAG Port on BRAVO Using the show interface Command 480 Link Aggregation Control Protocol LACP ...
Страница 481: ...Figure 71 Inspecting LAG 10 Using the show interfaces port channel Command Link Aggregation Control Protocol LACP 481 ...
Страница 522: ...Figure 87 Configuring Interfaces for MSDP 522 Multicast Source Discovery Protocol MSDP ...
Страница 523: ...Figure 88 Configuring OSPF and BGP for MSDP Multicast Source Discovery Protocol MSDP 523 ...
Страница 524: ...Figure 89 Configuring PIM in Multiple Routing Domains 524 Multicast Source Discovery Protocol MSDP ...
Страница 528: ...Figure 91 MSDP Default Peer Scenario 1 528 Multicast Source Discovery Protocol MSDP ...
Страница 529: ...Figure 92 MSDP Default Peer Scenario 2 Multicast Source Discovery Protocol MSDP 529 ...
Страница 530: ...Figure 93 MSDP Default Peer Scenario 3 530 Multicast Source Discovery Protocol MSDP ...
Страница 633: ...Policy based Routing PBR 633 ...
Страница 777: ...Figure 119 Single and Double Tag TPID Match Service Provider Bridging 777 ...
Страница 778: ...Figure 120 Single and Double Tag First byte TPID Match 778 Service Provider Bridging ...