Administrator Guide

Table Of Contents
272 | Authentication Servers Dell Networking W-Series ArubaOS 6.4.x| User Guide
b. Select the operation from the drop-down list.
c. Enter the operand.
d. To set the role, select set role from the Set drop-down list and enter the value to be assigned from the
Value drop-down list.
e. Or, to set the vlan, select set vlan from the Set drop-down list and select the VLAN name or ID from the
Value drop-down list and click the left-arrow.
f. Click Add.
g. Repeat the above steps to add other rules for the server group.
7. Click Apply.
Using the CLI
(host) (config) #aaa server-group <name>
(host) (Server Group name) #set {role|vlan} condition <attribute> contains|ends-
with|equals|not-equals|starts-with <operand> set-value <set-value-str> position <number>
Configuring a Role Derivation Rule for the Internal Database
When you add a user entry in the controller’s internal database, you can optionally specify a user role (see
Managing the Internal Database on page 263). The role specified in the internal database entry to be assigned
to the authenticated client, you must configure a server derivation rule as shown in the following sections:
Using the WebUI
1. Navigate to the Configuration > Security > Authentication > Servers page.
2. Select Server Group to display the Server Group list.
3. Select the internal server group.
4. Under Server Rules, click New to add a server derivation rule.
a. For Condition, enter Role.
b. Select value-of from the drop-down list.
c. Select Set Role from the drop-down list.
d. Click Add.
5. Click Apply.
Using the CLI
(host)(config) #aaa server-group internal
set role condition Role value-of
Assigning Server Groups
You can create server groups for the following purposes:
l user authentication
l management authentication
l accounting
You can configure all types of servers for user and management authentication (see Table 51). Accounting is
only supported with RADIUS and TACACS+ servers when RADIUS or TACACS+ is used for authentication.