Service Manual

For a 10-Gigabit Ethernet interface, enter the keyword
TenGigabitEthernet then the slot/port[/subport] information.
For a 40-Gigabit Ethernet interface, enter the keyword fortyGigE then the
slot/port information.
For a Loopback interface, enter the keyword loopback then a number from 0
to 16383.
For a port channel interface, enter the keywords port-channel then a
number.
For a Null interface, enter the keyword null then the Null interface number.
For a VLAN interface, enter the keyword vlan then a number from 1 to 4094.
Defaults Not configured.
Command Modes TACACS SERVER GROUP
Command
History
This guide is platform-specific. For command information about other platforms, refer to the relevant Dell
Networking OS Command Line Reference Guide.
The following is a list of the Dell Networking OS version history for this command.
Version Description
9.8(0.0P5) Introduced on the S4048-ON.
9.8(0.0P2) Introduced on the S3048-ON.
9.7(0.0) Introduced on the S6000ON.
9.4.(0.0) Introduced on the S-Series and Z-Series.
Usage
Information
You can use this command to associate a group of TACACS servers with a VRF and source interface. You
can configure the source interface only with the VRF attribute and source interface is optional with the
VRF attributes.
If VRF is not configured on the TACACS group, then the group is considered to be on the default VRF.
RADIUS groups and VRFs have one-to-one mapping. If a VRF is configured with one RADIUS group, then
you cannot use the same VRF with another RADIUS group. When the VRF is removed, then the
corresponding RADIUS group is also removed automatically.
Example
Dell(conf)#tacacs-server group group1
Dell(conf-tacacs-group)#tacacs-server vrf vrf1 source-interface
tengigabitethernet 1/36
Dell(conf)#tacacs-server group group2
Dell(conf-tacacs-group)#tacacs-server vrf default
Port Authentication (802.1X) Commands
An authentication server must authenticate a client connected to an 802.1X switch port. Until the authentication, only
Extensible Authentication Protocol over LAN (EAPOL) traffic is allowed through the port to which a client is connected. After
authentication is successful, normal traffic passes through the port.
Dell Networking OS supports RADIUS and Active Directory environments using 802.1X Port Authentication.
Important Points to Remember
Dell Networking OS limits network access for certain users by using VLAN assignments. 802.1X with VLAN assignment has
these characteristics when configured on the switch and the RADIUS server.
802.1X is supported on Dell Networking OS.
802.1X is not supported on the LAG or the channel members of a LAG.
1286
Security