Specifications

Administrative AAA Configuration Scenarios
RoamAbout Mobility System Software Configuration Guide 3-11
Administrative AAA Configuration Scenarios
Thefollowingscenariosillustratetypicalconfigurationsforadministrativeandlocal
authentication.Forallscenarios,theadministratorisNatasha withthepasswordm@Jor.(For
RADIUSserverconfigurationdetails,see Chapter 18,ConfiguringCommunicationwith
RADIUS.)
•“LocalAuthenticationonpage 311
•“LocalAuthenticationforConsoleUsersandRADIUSAuthenticationforTelnetUsers
on
page 311
•“LocalOverrideandBackupLocalAuthenticationonpage 312
•“AuthenticationWhenRADIUSServersDoNotRespondonpage 313
Local Authentication
ThefirsttimeyouaccessaRoamAbout Switch,itrequiresnoauthentication.(Formore
information,see“FirstTimeConfigurationUsingtheConsole”onpage 35.)Inthisscenario,after
theinitialconfigurationoftheRoamAboutSwitch,Natashaisconnectedthroughtheconsoleand
hasenabledaccess.
Example
Toenablelocalauthenticationforaconsoleuser,youmustconfigurealocalusername.Natasha
typesthefollowingcommandsinthisorder:
RBT-8100# set user natasha password m@Jor
User natasha created
RBT-8100# set authentication console * local
success: change accepted.
RBT-8100# save config
success: configuration saved.
Local Authentication for Console Users and RADIUS Authentication
for Telnet Users
ThisscenarioillustrateshowtoenablelocalauthenticationforconsoleusersandRADIUS
authenticationforTelnetadministrativeusers.Todoso,youconfigureatleastonelocalusername
forconsoleauthenticationandset upaRADIUSserverforTelnetadministrators.
Examples
Natashatypesthefollowingcomm andsinthisorder:
RBT-8100# set user natasha password m@Jor
User natasha created
RBT-8100# set authentication console * local
success: change accepted.
RBT-8100# set radius server r1 address 192.168.253.1 key sunFLOW#$
success: change accepted.