Reference Guide

show hardware forwarding-table mode all
Displays table sizes for the available hardware forwarding table modes.
Syntax
show hardware forwarding-table mode all
Parameters None
Defaults None
Command Mode EXEC
Usage Information Use this command to view details of all the forwarding-table modes.
Example
OS10# show hardware forwarding-table mode all
Mode default scaled-l2 scaled-l3-routes scaled-l3-hosts
L2 MAC Entries 163840 294912 32768 98304
L3 Host Entries 147456 16384 16384 212992
L3 Route Entries 16384 16384 131072 98304
Supported Releases 10.3.0E or later
Security
To help secure networks against unauthorized access, OS10 supports remote authentication dial-in service (RADIUS) client/server
authentication mechanism. The system acts as a RADIUS client and sends authentication requests to a RADIUS server that contains all
user authentication and network service access information.
A RADIUS server provides accounting, authentication (user credentials verication), and authorization (user privilege level) services. You
can congure the security protocol used for dierent login methods and users. The RADIUS server uses a list of authentication methods to
dene the types of authentication and the sequence in which they apply. By default, only the local authentication method is included in
the method list.
The authentication methods in the method list are executed in the order in which they are congured. You can re-enter the methods to
change the order. If a console user logs in with RADIUS authentication, the privilege level applies from the RADIUS server if you congured
the privilege level for that user in RADIUS.
NOTE
: You must congure the groupname (level) on the RADIUS server using the vendor-specic attribute or the authentication
will fail.
Congure the AAA authentication method in CONFIGURATION mode.
aaa authentication [local | radius]
local — Use the username and password database dened in the local conguration.
radius — (Optional) Use the RADIUS servers congured with the radius-server host command.
Save the conguration.
do commit
Congure AAA authentication
OS10(config)# aaa authentication radius local
OS10(config)# do commit
Role-based access control
RBAC provides control for access and authorization. Users are granted permissions based on dened roles — not on their individual system
user ID. Create user roles based on job functions to help users perform their associated job function. You can assign each user only a single
System management
363