Reference Guide

Table Of Contents
Supported
Releases
10.4.0E(R1) or later
ip telnet server vrf
Configures the Telnet server for the management VRF instance.
Syntax
ip telnet server vrf management
Parameters
management Configures the management VRF to be used to reach the Telnet server.
Default The Telnet server is reachable on the default VRF.
Command Mode CONFIGURATION
Usage
Information
By default, the Telnet server is disabled. To enable the Telnet server, enter the telnet enable
command. To configure the Telnet server to be reachable on the management VRF instance, use the ip
telnet server vrf management command.
Example
OS10(config)# ip telnet server vrf management
Supported
Releases
10.4.0E(R1) or later
Security
Authentication, authorization, and accounting (AAA) services secure networks against unauthorized access. In addition to local
authentication, OS10 supports remote authentication dial-in user service (RADIUS) and terminal access controller access control
system (TACACS+) client/server authentication systems. For RADIUS and TACACS+, an OS10 switch acts as a client and sends
authentication requests to a server that contains all user authentication and network service access information.
A RADIUS or TACACS+ server provides authentication (user credentials verification), authorization (role-based permissions),
and accounting services. You can configure the security protocol used for different login methods and users. RADIUS provides
very limited authorization and accounting services compared to TACACS+.
An OS10 switch uses a list of authentication methods to define the types of authentication and the sequence in which they
apply. By default, only the local authentication method is configured.
The authentication methods in the method list are executed in the order in which they are configured. You can re-enter the
methods to change the order. The local authentication method remains enabled even if you remove all configured methods in
the list (no aaa authentication login {console | default} command).
Configure the AAA authentication method in CONFIGURATION mode.
aaa authentication login {console | default} {local | group radius | group tacacs+}
console Configure authentication methods for console logins.
default Configure authentication methods for non-console (SSH and Telnet) logins.
local Use the local username, password, and role entries configured with the username password role
command.
group radius Use the RADIUS servers configured with the radius-server host command.
group tacacs+ Use the TACACS+ servers configured with the tacacs-server host command.
Configure user role on server
If a console user logs in with RADIUS or TACACS+ authentication, the role you configured for the user on the RADIUS or
TACACS+ server is applied. User authentication fails if no role is configured on the authentication server.
In addition, you must configure the user role on the RADIUS or TACACS+ server using the vendor-specific attribute (VSA)
or the authentication fails. Dell's vendor ID is 674. You create a VSA with Name = Dell-group-name, OID = 2,
Type = string. Valid values for Dell-group-name are sysadmin, secadmin, netadmin, and netoperator. Use the VSA
Dell-group-name values when you create users on a Radius or TACACS+ server.
For detailed information about how to configure vendor-specific attributes on a RADIUS or TACACS+ server, refer to the
respective RADIUS or TACACS+ server documentation.
System management
491