Concept Guide

enable: use the password the enable password command denes in
CONFIGURATION mode.
line: use the password the password command denes in LINE mode.
none: no authentication.
radius: use the RADIUS servers congured with the radius-server host
command.
tacacs+: use the TACACS+ servers congured with the tacacs-server host
command.
... method4 (OPTIONAL) Enter up to four additional methods. In the event of a “no response” from
the rst method, Dell Networking Operating System (OS) applies the next congured
method (up to four congured methods).
Defaults Not congured (that is, no authentication is performed).
Command Modes CONFIGURATION
Supported Modes All Modes
Command History
Version Description
9.11(0.0) Included a prompt to force the users to re-authenticate, when re-authentication is
enabled.
9.9(0.0) Introduced on the FN IOM.
9.4(0.0) Supported on the FN I/O Aggregator.
9.3(0.0) Supported on the M I/O Aggregator.
Usage Information
By default, the locally congured username password is used. If you congure aaa authentication login
default, Dell Networking Operating System (OS) uses the methods this command denes for login instead.
Methods congured with the aaa authentication login command are evaluated in the order they are
congured. If users encounter an error with the rst method listed, Dell Networking Operating System (OS) applies
the next method congured. If users fail the rst method listed, no other methods are applied. The only exception
is the local method. If the user’s name is not listed in the local database, the next method is applied. If the correct
user name/password combination is not entered, the user is not allowed access to the switch.
NOTE: If authentication fails using the primary method, Dell Networking Operating System (OS) employs
the second method (or third method, if necessary) automatically. For example, if the TACACS+ server is
reachable, but the server key is invalid, Dell Networking Operating System (OS) proceeds to the next
authentication method. The TACACS+ is incorrect, but the user is still authenticated by the secondary
method.
After conguring the aaa authentication login command, congure the login authentication
command to enable the authentication scheme on terminal lines.
Connections to the SSH server work with the following login mechanisms: local, radius, and tacacs.
Related Commands
login authentication — enables AAA login authentication on the terminal lines.
radius-server hostspecies a RADIUS server host.
tacacs-server hostspecies a TACACS+ server host.
326 Security