White Papers

Table Of Contents
applied. The only exception is the local method. If the users name is not listed in the local database, the
next method is applied. If the correct user name/password combination is not entered, the user is not
allowed access to the switch.
NOTE: If authentication fails using the primary method, Dell Networking Operating System (OS)
employs the second method (or third method, if necessary) automatically. For example, if the
TACACS+ server is reachable, but the server key is invalid, Dell Networking Operating System
(OS) proceeds to the next authentication method. The TACACS+ is incorrect, but the user is still
authenticated by the secondary method.
After configuring the aaa authentication login command, configure the login
authentication command to enable the authentication scheme on terminal lines.
Connections to the SSH server work with the following login mechanisms: local, radius, and tacacs.
Related
Commands
login authentication enables AAA login authentication on the terminal lines.
radius-server host specifies a RADIUS server host.
tacacs-server host specifies a TACACS+ server host.
authorization
Apply an authorization method list to terminal lines.
Syntax
authorization {exec | commands {level | role role-name} method-list
Parameters
exec
Enter the keyword exec to apply an EXEC level accounting method list.
commands {
level
| role
role-name
}
Enter the keywords commands followed by either a privilege level for accounting
of commands executed at that privilege level, or enter the keyword role then the
role name for authorization of commands executed by a user with that user role.
role method is supported only on Full-Switch mode.
method-list
Enter a method list that you defined using the aaa accounting exec or aaa
accounting commands.
Defaults none
Command Modes LINE
Supported Modes All Modes.
Command
History
Version Description
9.9(0.0) Introduced on the FN IOM.
9.5(0.0) Introduced the support for roles on the MXL 10/40GbE Switch.
8.3.16.1 Introduced on the MXL 10/40GbE Switch IO Module.
Related
Commands
aaa authorization commands sets the parameters that restrict (or permit) a users access to EXEC and
CONFIGURATION level commands
aaa authorization exec sets the parameters that restrict (or permit) a users access to EXEC level
commands.
aaa authorization commands
Set parameters that restrict (or permit) a users access to EXEC and CONFIGURATION level commands.
Syntax
aaa authorization commands {level | role role-name}{name | default} {local
| tacacs+ | none}
1014 Security