CLI Guide

NOTE: If authentication fails using the primary method, Dell Networking
Operating System (OS) employs the second method (or third method, if
necessary) automatically. For example, if the TACACS+ server is reachable, but
the server key is invalid, Dell Networking Operating System (OS) proceeds to
the next authentication method. The TACACS+ is incorrect, but the user is still
authenticated by the secondary method.
After configuring the aaa authentication login command, configure the
login authentication command to enable the authentication scheme on
terminal lines.
Connections to the SSH server work with the following login mechanisms: local,
radius, and tacacs.
Related
Commands
login authentication — enables AAA login authentication on the terminal lines.
radius-server host — specifies a RADIUS server host.
tacacs-server host — specifies a TACACS+ server host.
authorization
Apply an authorization method list to terminal lines.
Syntax
authorization {exec | commands {level | role role-name} method-
list
Parameters
exec Enter the keyword exec to apply an EXEC level accounting
method list.
commands {level |
role role-name}
Enter the keywords commands followed by either a privilege
level for accounting of commands executed at that privilege
level, or enter the keyword role then the role name for
authorization of commands executed by a user with that
user role.
role method is supported only on Full-Switch
mode.
method-list Enter a method list that you defined using the aaa
accounting exec or aaa accounting commands.
Defaults none
Command Modes LINE
Supported Modes All Modes.
Command History
Version Description
9.9(0.0) Introduced on the FN IOM.
9.5(0.0) Introduced the support for roles on the MXL 10/40GbE
Switch.
Security
1317