Configuration Task List For Aaa Authentication - Dell S6100 Configuration Manual

Hide thumbs Also See for S6100:
Table of Contents

Advertisement

NOTE:
If a console user logs in with RADIUS authentication, the privilege level is applied from the RADIUS server if the privilege
level is configured for that user in RADIUS, whether you configure RADIUS authorization.

Configuration Task List for AAA Authentication

The following sections provide the configuration tasks.
Configuring AAA Authentication Login Methods
Enabling AAA Authentication
Enabling AAA Authentication - RADIUS
For a complete list of all commands related to login authentication, refer to the Security chapter in the Dell Networking OS Command
Reference Guide.
Configure Login Authentication for Terminal Lines
You can assign up to five authentication methods to a method list. Dell Networking OS evaluates the methods in the order in which you
enter them in each list.
If the first method list does not respond or returns an error, Dell Networking OS applies the next method list until the user either passes or
fails the authentication. If the user fails a method list, Dell Networking OS does not apply the next method list.
Configuring AAA Authentication Login Methods
To configure an authentication method and method list, use the following commands.
Dell Networking OS Behavior: If you use a method list on the console port in which RADIUS or TACACS is the last authentication method,
and the server is not reachable, Dell Networking OS allows access even though the username and password credentials cannot be verified.
Only the console port behaves this way, and does so to ensure that users are not locked out of the system if network-wide issue prevents
access to these servers.
1
Define an authentication method-list (method-list-name) or specify the default.
CONFIGURATION mode
aaa authentication login {method-list-name | default} method1 [... method4]
The default method-list is applied to all terminal lines.
Possible methods are:
enable: use the password you defined using the enable secret, enable password, or enable sha256-password
command in CONFIGURATION mode. In general, the enable secret command overrules the enable password command.
If you configure the enable sha256-password command, it overrules both the enable secret and enable password
commands.
line: use the password you defined using the password command in LINE mode.
local: use the username/password database defined in the local configuration.
none: no authentication.
radius: use the RADIUS servers configured with the radius-server host command.
tacacs+: use the TACACS+ servers configured with the tacacs-server host command.
2
Enter LINE mode.
CONFIGURATION mode
line {aux 0 | console 0 | vty number [... end-number]}
3
Assign a method-list-name or the default list to the terminal line.
LINE mode
Security
757

Advertisement

Table of Contents
loading

Table of Contents