Administrator Guide
Monitoring AAA Accounting
The Dell Networking OS does not support periodic interim accounting because the periodic command can cause heavy
congestion when many users are logged in to the network.
No specic show command exists for TACACS+ accounting.
To obtain accounting records displaying information about users currently logged in, use the following command.
• Step through all active sessions and print all the accounting records for the actively accounted functions.
CONFIGURATION mode or EXEC Privilege mode
show accounting
Example of the show accounting Command for AAA Accounting
Dell#show accounting
Active accounted actions on tty2, User admin Priv 1
Task ID 1, EXEC Accounting record, 00:00:39 Elapsed, service=shell
Active accounted actions on tty3, User admin Priv 1
Task ID 2, EXEC Accounting record, 00:00:26 Elapsed, service=shell
Dell#
AAA Authentication
The Dell Newtorking OS supports a distributed client/server system implemented through authentication, authorization, and
accounting (AAA) to help secure networks against unauthorized access.
In the Dell Networking implementation, the Dell Networking system acts as a RADIUS or TACACS+ client and sends authentication
requests to a central remote authentication dial-in service (RADIUS) or Terminal access controller access control system plus
(TACACS+) server that contains all user authentication and network service access information.
Dell Networking uses local usernames/passwords (stored on the Dell Networking system) or AAA for login authentication. With AAA,
you can specify the security protocol or mechanism for dierent login methods and dierent users. In the Dell Networking OS, AAA
uses a list of authentication methods, called method lists, to dene the types of authentication and the sequence in which they are
applied. You can dene a method list or use the default method list. User-dened method lists take precedence over the default
method list.
NOTE: If a console user logs in with RADIUS authentication, the privilege level is applied from the RADIUS server if the
privilege level is congured for that user in RADIUS, whether you congure RADIUS authorization.
Conguration Task List for AAA Authentication
The following sections provide the conguration tasks.
• Congure Login Authentication for Terminal Lines
• Conguring AAA Authentication Login Methods
• Enabling AAA Authentication
• Enabling AAA Authentication — RADIUS
For a complete list of all commands related to login authentication, refer to the Security chapter in the Dell Networking OS
Command Reference Guide.
Congure Login Authentication for Terminal Lines
You can assign up to ve authentication methods to a method list. The Dell Networking OS evaluates the methods in the order in
which you enter them in each list.
If the rst method list does not respond or returns an error, the system applies the next method list until the user either passes or
fails the authentication. If the user fails a method list, the system does not apply the next method list.
678
Security