Administrator Guide

Dell Networking uses local usernames/passwords (stored on the Dell Networking system) or AAA for login authentication. With AAA,
you can specify the security protocol or mechanism for dierent login methods and dierent users. In Dell Networking OS, AAA uses
a list of authentication methods, called method lists, to dene the types of authentication and the sequence in which they are
applied. You can dene a method list or use the default method list. User-dened method lists take precedence over the default
method list.
NOTE: If a console user logs in with RADIUS authentication, the privilege level is applied from the RADIUS server if the
privilege level is congured for that user in RADIUS, whether you congure RADIUS authorization.
Conguration Task List for AAA Authentication
The following sections provide the conguration tasks.
Congure Login Authentication for Terminal Lines
Conguring AAA Authentication Login Methods
Enabling AAA Authentication
For a complete list of all commands related to login authentication, refer to the Security chapter in the Dell Networking OS
Command Reference Guide.
Congure Login Authentication for Terminal Lines
You can assign up to ve authentication methods to a method list. Dell Networking OS evaluates the methods in the order in which
you enter them in each list.
If the rst method list does not respond or returns an error, Dell Networking OS applies the next method list until the user either
passes or fails the authentication. If the user fails a method list, Dell Networking OS does not apply the next method list.
Conguring AAA Authentication Login Methods
To congure an authentication method and method list, use the following commands.
Dell Networking OS Behavior: If you use a method list on the console port in which RADIUS or TACACS is the last authentication
method, and the server is not reachable, Dell Networking OS allows access even though the username and password credentials
cannot be veried. Only the console port behaves this way, and does so to ensure that users are not locked out of the system if
network-wide issue prevents access to these servers.
1. Dene an authentication method-list (method-list-name) or specify the default.
CONFIGURATION mode
aaa authentication login {method-list-name | default} method1 [... method4]
The default method-list is applied to all terminal lines.
Possible methods are:
enable: use the password you dened using the enable secret or enable password command in
CONFIGURATION mode.
line: use the password you dened using the password command in LINE mode.
local: use the username/password database dened in the local conguration.
none: no authentication.
radius: use the RADIUS servers congured with the radius-server host command.
tacacs+: use the TACACS+ servers congured with the tacacs-server host command.
2. Enter LINE mode.
CONFIGURATION mode
line {aux 0 | console 0 | vty number [... end-number]}
3. Assign a method-list-name or the default list to the terminal line.
LINE mode
154
Security