Users Guide

Table Of Contents
Delete TACACS+ server
OS10# no tacacs-server host 1.2.4.5
Unknown user role
When a RADIUS or TACACS+ server authenticates a user, it may return an unknown user role, or the role may be missing. In these cases,
OS10 assigns the netoperator role and associated permissions to the user by default. You can reconfigure the default assigned role. In
addition, you can configure an unknown RADIUS or TACACS+ user-role name to inherit the permissions of an existing OS10 system-
defined role.
Reconfigure the default OS10 user role in CONFIGURATION mode.
userrole {default | name} inherit existing-role-name
default inherit — Reconfigure the default permissions assigned to an authenticated user with a missing or unknown role.
name inherit — Enter the name of the RADIUS or TACACS+ user role that inherits permissions from an OS10 user role; 32
characters maximum.
existing-role-name — Assign the permissions associated with an existing OS10 user role:
sysadmin — Full access to all commands in the system, exclusive access to commands that manipulate the file system, and
access to the system shell. A system administrator can create user IDs and user roles.
secadmin — Full access to configuration commands that set security policy and system access, such as password strength,
AAA authorization, and cryptographic keys. A security administrator can display security information, such as cryptographic
keys, login statistics, and log information.
netadmin — Full access to configuration commands that manage traffic flowing through the switch, such as routes,
interfaces, and ACLs. A network administrator cannot access configuration commands for security features or view security
information.
netoperator — Access only to EXEC mode to view the current configuration. A network operator cannot modify
configuration settings on a switch.
Reconfigure permissions for an unknown user role
OS10(config)# userrole default inherit sysadmin
Configure permissions for a RADIUS or TACACS+ user role
OS10(config)# userrole tacacsadmin inherit netadmin
SSH server
In OS10, the secure shell server allows an SSH client to access an OS10 switch through a secure, encrypted connection. The SSH server
authenticates remote clients using RADIUS challenge/response, a trusted host file, locally-stored passwords, and public keys.
Configure SSH server
The SSH server is enabled by default. You can disable the SSH server using the no ip ssh server enable command.
Challenge response authentication is disabled by default. To enable, use the ip ssh server challenge-response-
authentication command.
Host-based authentication is disabled by default. To enable, use the ip ssh server hostbased-authentication command.
Password authentication is enabled by default. To disable, use the no ip ssh server password-authentication
command.
Public key authentication is enabled by default. To disable, use the no ip ssh server pubkey-authentication command.
Password-less login is disabled by default. To enable, use the username sshkey or username sshkey filename commands.
Configure the list of cipher algorithms using the ip ssh server cipher cipher-list command.
Configure key exchange algorithms using the ip ssh server kex key-exchange-algorithm command.
Configure hash message authentication code (HMAC) algorithms using the ip ssh server mac hmac-algorithm command.
Configure the SSH server listening port using the ip ssh server port port-number command.
Configure the SSH server to be reachable on the management VRF using the ip ssh server vrf command.
Configure the SSH login timeout using the ip ssh server login-grace-time seconds command, from 0 to 300; default
60. To reset the default SSH prompt timer, use the no ip ssh server login-grace-time command.
930
Security