Users Guide

Table Of Contents
Security
Authentication, authorization, and accounting (AAA) services secure networks against unauthorized access. In addition to local
authentication, OS10 supports remote authentication dial-in user service (RADIUS) and terminal access controller access control system
(TACACS+) client/server authentication systems. For RADIUS and TACACS+, an OS10 switch acts as a client and sends authentication
requests to a server that contains all user authentication and network service access information.
A RADIUS or TACACS+ server provides: authentication of user credentials, authorization using role-based permissions, and accounting
services. You can configure the security protocol used for different login methods and users. RADIUS provides limited authorization and
accounting services compared to TACACS+. If you use a RADIUS or TACACS+ security server, configure the required security parameters
on the server by following the procedures in the server documentation.
AAA configuration
On the switch, AAA configuration consists of setting up access control and accounting services:
1. Configure the authentication methods used to allow access to the switch.
2. Configure the level of command authorization for authenticated users.
3. Configure security settings for user sessions.
4. Enable AAA accounting.
AAA authentication
An OS10 switch uses a list of authentication methods to define the types of authentication and the sequence in which they apply. By
default, OS10 uses only the local authentication method.
The authentication methods in the method list execute in the order you configure them. Re-enter the methods to change the order. The
local authentication method remains enabled even if you remove all configured methods in the list using the no aaa
authentication login {console | default} command.
NOTE:
If you configure multiple authentication methods on Dell EMC PowerEdge MX7000 Ethernet modules —
MX9116n Fabric Switching Engine and MX5108n Ethernet Switch — operating in SmartFabric mode, you must configure
local authentication as the first method in the list.
Configure the AAA authentication method in CONFIGURATION mode.
aaa authentication login {console | default} {local | group radius | group tacacs+}
console — Configure authentication methods for console logins.
default — Configure authentication methods for non-console such as SSH and Telnet logins.
local — Use the local username, password, and role entries configured with the username password role command.
group radius — Configure RADIUS servers using the radius-server host command.
group tacacs+ — Configure TACACS+ servers using the tacacs-server host command.
Configure user role on server
If a console user logs in with RADIUS or TACACS+ authentication, the role you configured for the user on the RADIUS or TACACS+ server
applies. User authentication fails if no role is configured on the authentication server.
Also, you must configure the user role on the RADIUS or TACACS+ server using the vendor-specific attribute (VSA) or the authentication
fails. Dell EMC's vendor ID is 674. Create a VSA with Name = Dell-group-name, OID = 2, Type = string. Valid values for
Dell-group-name are sysadmin, secadmin, netadmin, and netoperator. Use the VSA Dell-group-name values when you create
users on a Radius or TACACS+ server.
For detailed information about how to configure vendor-specific attributes on a RADIUS or TACACS+ server, see the respective RADIUS
or TACACS+ server documentation.
Configure AAA authentication
OS10(config)# aaa authentication login default group radius local
OS10(config)# do show running-configuration aaa
18
Security 921