Vty Line Remote Authentication And Authorization - Dell Force10 MXL Blade Configuration Manual

Configuration guide for the mxl 10/40gbe switch io module
Hide thumbs Also See for Force10 MXL Blade:
Table of Contents

Advertisement

You can assign line authentication on a per-VTY basis; it is a simple password authentication using an
access-class as authorization.
Local authentication is configured globally. You configure access classes on a per-user basis.
FTOS can assign different access classes to different users by username. Until users attempt to log in,
FTOS does not know if they will be assigned a VTY line. This means that incoming users always see a
login prompt even if you have excluded them from the VTY line with a
identify themselves, FTOS retrieves the access class from the local database and applies it. (FTOS also
subsequently can close the connection if a user is denied access.)
Note: If a VTY user logs in with RADIUS authentication, the privilege level is applied from the RADIUS
server only if you configure RADIUS authentication.
Figure 28-16
shows how to allow or deny a Telnet connection to a user. Users see a login prompt, even if
they cannot login. No access class is configured for the VTY line. It defaults from the local database.
Figure 28-16. Example Access-Class Configuration Using Local Database
FTOS(conf)#user gooduser password abc privilege 10 access-class permitall
FTOS(conf)#user baduser password abc privilege 10 access-class denyall
FTOS(conf)#
FTOS(conf)#aaa authentication login localmethod local
FTOS(conf)#
FTOS(conf)#line vty 0 9
FTOS(conf-line-vty)#login authentication localmethod
FTOS(conf-line-vty)#end
Note: For more information, refer to

VTY Line Remote Authentication and Authorization

FTOS takes the access class from the VTY line and applies it to ALL users. FTOS does not need to know
the identity of the incoming user and can immediately apply the access class. If the authentication method
is radius, TACACS+, or line, and you have configured an access class for the VTY line, FTOS
immediately applies it. If the access-class is
connection without displaying the login prompt.
from subnet 10.0.0.0 without displaying a login prompt. The example uses TACACS+ as the
authentication mechanism.
Access Control Lists
(ACLs).
or
deny all
deny for the incoming subnet
Figure 28-17
access class. After users
deny-all
, FTOS closes the
shows how to deny incoming connections
Security | 501

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents