Configuration manual

Dell PowerConnect W-AirWave 7.4 | Configuration Guide Configuration Reference | 145
AAA
Captive Portal Auth
Management Auth
Stateful 802.1X Auth
TACACS Accounting
VPN Auth
Folder
The list of servers in a server group is an ordered list. By default, the first server in the list is always used unless it
is unavailable, in which case the next server in the list is used. You can configure the order of servers in the server
group. In the Web UI, use the up or down arrows to order the servers (the top server is the first server in the list).
In the CLI, use the position parameter to specify the relative order of servers in the list (the lowest value denotes
the first server in the list).
The first available server in the list is used for authentication. If the server responds with an authentication
failure, there is no further processing for the user or client for which the authentication request failed. You can
optionally enable fail-through authentication for the server group so that if the first server in the list returns an
authentication deny, the controller attempts authentication with the next server in the ordered list. The
controller attempts authentication with each server in the list until either there is a successful authentication or
the list of servers in the group is exhausted. This feature is useful in environments where there are multiple,
independent authentication servers; users may fail authentication on one server but can be authenticated on
another server.
Before enabling fail-through authentication, note the following:
This feature is not supported for 802.1x authentication with a server group that consists of external EAP
compliant RADIUS servers. You can, however, use fail-through authentication when the 802.1x
authentication is terminated on the controller (AAA FastConnect).
Enabling this feature for a large server group list may cause excess processing load on the controller. Use server
selection based on domain matching whenever possible.
Certain servers, such as the RSA RADIUS server, lock out the controller if there are multiple authentication
failures. Therefore you should not enable fail-through authentication with these servers.
When fail-through authentication is enabled, users that fail authentication on the first server in the server list
should be authenticated with the second server.
Supported Servers
ArubaOS supports the following external authentication servers:
RADIUS (Remote Authentication Dial-In User Service)
LDAP (Lightweight Directory Access Protocol)
TACACS+ (Terminal Access Controller Access Control System)
Additionally, you can use the controller’s internal database to authenticate users. You create entries in the
database for users and their passwords and default role.
You can create groups of servers for specific types of authentication. For example, you can specify one or more
RADIUS servers to be used for 802.1x authentication. The list of servers in a server group is an ordered list. This
means that the first server in the list is always used unless it is unavailable, in which case the next server in the list
is used. You can configure servers of different types in one group — for example, you can include the internal
database as a backup to a RADIUS server.
Server names are unique. You can configure the same server in multiple server groups. You must configure the
server before you can add it to a server group.