Install Guide

Table Of Contents
Table 90. Use cases for dot1x supplicant to trigger RADIUS Accounting Start/Stop records (continued)
dot1x event Accounting type Attributes
Configure max supplicant per
interface
Stop Stop record attributes with termination cause as
port-reinitialized (21).
Supplicant goes off without
explicitly sending EAP logoff
Stop Stop record attributes with termination cause as Idle
Timeout (4).
Periodic Reauth of supplicant Stop Stop record attributes with termination cause as
Supplicant restart (19).
Failure of dot1x authorized port
assignment to untagged VLAN
Stop Stop record attributes with termination cause as
Port error (8).
dot1x user Reauth-failure Stop Stop record attributes with termination cause as
Reauthentication Failure (20).
Disable dot1x globally/interface Stop Stop record attributes with termination cause as
Port Administratively Disabled (22).
AAA Authentication
Dell EMC Networking OS supports a distributed client/server system implemented through authentication, authorization, and
accounting (AAA) to help secure networks against unauthorized access.
In the Dell EMC Networking implementation, the Dell EMC Networking system acts as a RADIUS or TACACS+ client and sends
authentication requests to a central remote authentication dial-in service (RADIUS) or Terminal access controller access control
system plus (TACACS+) server that contains all user authentication and network service access information.
Dell EMC Networking uses local usernames/passwords (stored on the Dell EMC Networking system) or AAA for login
authentication. With AAA, you can specify the security protocol or mechanism for different login methods and different users. In
Dell EMC Networking OS, AAA uses a list of authentication methods, called method lists, to define the types of authentication
and the sequence in which they are applied. You can define a method list or use the default method list. User-defined method
lists take precedence over the default method list.
NOTE:
If a console user logs in with RADIUS authentication, the privilege level is applied from the RADIUS server if the
privilege level is configured for that user in RADIUS, whether you configure RADIUS authorization.
NOTE: RADIUS and TACACS servers support VRF-awareness functionality. You can create RADIUS and TACACS groups
and then map multiple servers to a group. The group to which you map multiple servers is bound to a single VRF.
Configuration Task List for AAA Authentication
The following sections provide the configuration tasks.
Configuring AAA Authentication Login Methods
Enabling AAA Authentication
Enabling AAA Authentication - RADIUS
For a complete list of all commands related to login authentication, refer to the Security chapter in the Dell EMC Networking OS
Command Reference Guide.
Configure Login Authentication for Terminal Lines
You can assign up to five authentication methods to a method list. Dell EMC Networking OS evaluates the methods in the order
in which you enter them in each list.
If the first method list does not respond or returns an error, Dell EMC Networking OS applies the next method list until the user
either passes or fails the authentication. If the user fails a method list, Dell EMC Networking OS does not apply the next method
list.
Security
757