Methods configured with the
aaa authentication login
command are evaluated in the order they are
configured. If users encounter an error with the first method listed, Dell Networking OS applies the next method
configured. If users fail the first method listed, no other methods are applied. The only exception is the local
method. If the user’s name is not listed in the local database, the next method is applied. If the correct user name/
password combination is not entered, the user is not allowed access to the switch.
NOTE:
If authentication fails using the primary method, Dell Networking OS employs the second
method (or third method, if necessary) automatically. For example, if the server is reachable,
but the server key is invalid, Dell Networking OS proceeds to the next authentication method. The
is incorrect, but the user is still authenticated by the secondary method.
After configuring the
aaa authentication login
command, configure the
login authentication
command to enable the authentication scheme on terminal lines.
Connections to the SSH server work with the following login mechanisms: local, radius, and tacacs.
Related Commands
•
— enables AAA login authentication on the terminal lines.
•
— creates a password.
•
— specifies a RADIUS server host.
•
— specifies a server host.
aaa reauthenticate enable
Enable re-authentication of user whenever there is a change in the authenticators.
Syntax
aaa reauthenticate enable
To disable the re-authentication option, use the
no aaa reauthenticate enable
command.
Defaults
Disabled
Command Modes
CONFIGURATION
Command History
This guide is platform-specific. For command information about other platforms, see the relevant
Dell Networking
OS Command Line Reference Guide
.
Version
Description
9.11(0.0)
Introduced this command.
Usage Information
When an operating system enables to change the user authenticators, the users might access resources and
perform tasks that they do not have authorization.
Once re-authentication is enabled, Dell Networking OS prompts the users to re-authenticate whenever there is a
change in authenticators.
The change in authentication happens when:
•
Add or remove an authentication server (RADIUS/)
•
Modify an AAA authentication/authorization list
•
Change to role-only (RBAC) mode
Security
1391
Содержание S6100
Страница 1: ...Dell Command Line Reference Guide for the S6100 ON System 9 11 2 0P1 ...
Страница 474: ...protocol list ttl0 ttl1 Dell 474 Control Plane Policing CoPP ...
Страница 979: ... show lldp neighbors display the LLDP neighbors Link Layer Discovery Protocol LLDP 979 ...
Страница 1627: ... uplink state group creates an uplink state group and enables the tracking of upstream links Uplink Failure Detection UFD 1627 ...