Specifications

Administrative AAA Configuration Scenarios
3-12 Configuring AAA for Administrative and Local Access
NatashaalsoaddstheRADIUSserver(r1)totheRADIUSservergroupsg1,andconfiguresTelnet
administrativeusersforauthenticationthroughthegroup.Shetypesthefollowingcommandsin
thisorder:
RBT-8100#RBT-8100# set server group sg1 members r1
success: change accepted.
RBT-8100# set authentication admin * sg1
success: change accepted.
RBT-8100# save config
success: configuration saved.
Local Override and Backup Local Authentication
Thisscenarioillustrateshowtoenablelocaloverrideauthenticationforconsoleusers.Local
overridemeansthatMSSattemptsauthenticationfirstviathelocaldatabase.Ifitfindsnomatch
fortheuserinthelocaldatabase,MSSthentries aRADIUSserver—inthiscase,serverr1inserver
groupsg1.
Example
Natashatypesthefollowingcomm andsinthisorder:
RBT-8100# set user natasha password m@Jor
User natasha created
RBT-8100# set radius server r1 address 192.168.253.1 key sunFLOW#$
success: change accepted.
RBT-8100# set server group sg1 members r1
success: change accepted.
RBT-8100# set authentication console * local sg1
success: change accepted.
RBT-8100# save config
success: configuration saved.
NatashaalsoenablesbackupRADIUSauthentication forTelnetadministrativeusers.Ifthe
RADIUSserverdoesnotrespond,theuserisauthenticatedbythelocaldatabaseinthe
RoamAboutSwitch.Natashatypesthefollowingcommands:
RBT-8100# set authentication admin * sg1 local
success: change accepted.
RBT-8100# save config
success: configuration saved.
TheorderinwhichNatashaentersauthenticationmethodsinthesetauthenticationcommand
determinesthemethodMSSattemptsfirst.Thelocaldatabaseisthefirstmethodattemptedfor
consoleusersandthelastmethodattemptedforTelnetadministrators.