Users Guide

Table Of Contents
198| Authentication Servers Dell Networking W-Series ArubaOS 6.5.x| User Guide
Using the CLI
(host) (config) #aaa server-group <name>
(host) (Server Group name) #set {role|vlan} condition <attribute> contains|ends-
with|equals|not-equals|starts-with <operand> set-value <set-value-str> position <number>
Configuring a Role Derivation Rule for the Internal Database
When you add a user entry in the controller’s internal database, you can optionally specify a user role (see
Managing the Internal Database on page 189). The role specified in the internal database entry to be assigned
to the authenticated client, you must configure a server derivation rule as shown in the following sections:
Using the WebUI
1. Navigate to the Configuration > Security > Authentication > Servers page.
2. Select Server Group to display the Server Group list.
3. Select the internal server group.
4. Under Server Rules, click New to add a server derivation rule.
a. For Condition, enter Role.
b. Select value-of from the drop-down list.
c. Select Set Role from the drop-down list.
d. Click Add.
5. Click Apply.
Using the CLI
(host)(config) #aaa server-group internal
set role condition Role value-of
Assigning Server Groups
You can create server groups for the following purposes:
l user authentication
l management authentication
l accounting
You can configure all types of servers for user and management authentication (see Table 45). Accounting is
only supported with RADIUS and TACACS+ servers when RADIUS or TACACS+ is used for authentication.
RADIUS TACACS+ LDAP Internal Database
User authentication Yes Yes Yes Yes
Management authentication Yes Yes Yes Yes
Accounting Yes Yes No No
Table 45: Server Types and Purposes
User Authentication
For information about assigning a server group for user authentication, refer to the Roles and Policies chapter
of the Dell Networking W-Series ArubaOS User Guide.