Administrator Guide
Example of Enabling Local Authentication for the Console and Remote Authentication for VTY Lines
Dell(config)# aaa authentication enable mymethodlist radius tacacs
Dell(config)# line vty 0 9
Dell(config-line-vty)# enable authentication mymethodlist
Server-Side Conguration
• TACACS+ — When using TACACS+, Dell Networking OS sends an initial packet with service type SVC_ENABLE, and then
sends a second packet with just the password. The TACACS server must have an entry for username $enable$.
• RADIUS — When using RADIUS authentication, Dell Networking OS sends an authentication packet with the following:
Username: $enab15$
Password: <password-entered-by-user>
Therefore, the RADIUS server must have an entry for this username.
AAA Authorization
The Dell Networking OS enables AAA new-model by default.
You can set authorization to be either local or remote. Dierent combinations of authentication and authorization yield dierent
results. By default, the system sets both to local.
Privilege Levels Overview
Limiting access to the system is one method of protecting the system and your network. However, at times, you might need to allow
others access to the router and you can limit that access to a subset of commands. In the Dell Networking OS, you can congure a
privilege level for users who need limited access to the system.
Every command in the Dell Networking OS is assigned a privilege level of 0, 1, or 15. You can congure up to 16 privilege levels. The
Dell Networking OS is pre-congured with three privilege levels and you can congure 13 more. The three pre-congured levels are:
• Privilege level 1 — is the default level for EXEC mode. At this level, you can interact with the router, for example, view some
show commands and Telnet and ping to test connectivity, but you cannot congure the router. This level is often called the
“user” level. One of the commands available in Privilege level 1 is the enable command, which you can use to enter a specic
privilege level.
• Privilege level 0 — contains only the end, enable, and disable commands.
• Privilege level 15 — the default level for the enable command, is the highest level. In this level you can access any command
in the Dell Networking OS.
Privilege levels 2 through 14 are not congured and you can customize them for dierent users and access.
After you congure other privilege levels, enter those levels by adding the level parameter after the enable command or by
conguring a user name or password that corresponds to the privilege level. For more information about conguring user names,
refer to Conguring a Username and Password.
By default, commands are assigned to dierent privilege levels. You can access those commands only if you have access to that
privilege level. For example, to reach the protocol spanning-tree command, log in to the router, enter the enable
command for privilege level 15 (this privilege level is the default level for the command) and then enter CONFIGURATION mode.
You can congure passwords to control access to the box and assign dierent privilege levels to users. The Dell Networking OS
supports the use of passwords when you log in to the system and when you enter the enable command. If you move between
privilege levels, you are prompted for a password if you move to a higher privilege level.
Conguration Task List for Privilege Levels
The following list has the conguration tasks for privilege levels and passwords.
• Conguring a Username and Password (mandatory)
156
Security