Setup Guide

dot1x event Accounting type Attributes
Administrative shut of dot1x
authorized interface
Stop Stop record attributes with termination cause as Lost
carrier (2).
CLI user session disconnects due to
dynamic authorization (CoA port
bounce/session termination/VLAN
change)
Stop Stop record attributes with termination cause as Admin
Reset (6).
Deauthorization due to VLAN change Stop Stop record attributes with termination cause as Admin
Reset (6).
CLI conguration of the dot1x
authorized port to mab-only auth-
type
Stop Stop record attributes with termination cause as port-
reinitialized (21).
Congure Port control to force
unauth
Stop Stop record attributes with termination cause as port-
reinitialized (21).
Interface Host mode change (single/
multihost/multiauth)
Stop Stop record attributes with termination cause as port-
reinitialized (21).
Congure max supplicant per
interface
Stop Stop record attributes with termination cause as port-
reinitialized (21).
Supplicant goes o without explicitly
sending EAP logo
Stop Stop record attributes with termination cause as Idle
Timeout (4).
Periodic Reauth of supplicant Stop Stop record attributes with termination cause as
Supplicant restart (19).
Failure of dot1x authorized port
assignment to untagged VLAN
Stop Stop record attributes with termination cause as Port
error (8).
dot1x user Reauth-failure Stop Stop record attributes with termination cause as
Reauthentication Failure (20).
Disable dot1x globally/interface Stop Stop record attributes with termination cause as Port
Administratively Disabled (22).
AAA Authentication
The system supports a distributed client/server system implemented through authentication, authorization, and accounting (AAA) to help
secure networks against unauthorized access.
In the Dell Networking implementation, the switch acts as a RADIUS or TACACS+ client and sends authentication requests to a central
remote authentication dial-in service (RADIUS) or Terminal access controller access control system plus (TACACS+) server that contains all
user authentication and network service access information.
Dell Networking uses local usernames/passwords (stored on the Dell Networking system) or AAA for login authentication. With AAA, you
can specify the security protocol or mechanism for dierent login methods and dierent users. In the Dell Networking OS, AAA uses a list
of authentication methods, called method lists, to dene the types of authentication and the sequence in which they are applied. You can
dene a method list or use the default method list. User-dened method lists take precedence over the default method list.
NOTE
: If a console user logs in with RADIUS authentication, the privilege level is applied from the RADIUS server if the privilege
level is congured for that user in RADIUS, whether you congure RADIUS authorization.
Conguration Task List for AAA Authentication
The following sections provide the conguration tasks.
Congure Login Authentication for Terminal Lines
Security
915