Dell FCX624-S Laptop User Manual


  Open as PDF
of 1494
 
1184 PowerConnect B-Series FCX Configuration Guide
53-1002266-01
Configuring RADIUS security
32
AAA security for commands pasted Into the running-config
If AAA security is enabled on the device, commands pasted into the running-config are subject to
the same AAA operations as if they were entered manually.
When you paste commands into the running-config, and AAA command authorization or
accounting, or both, are configured on the device, AAA operations are performed on the pasted
commands. The AAA operations are performed before the commands are actually added to the
running-config. The server performing the AAA operations should be reachable when you paste the
commands into the running-config file. If the device determines that a pasted command is invalid,
AAA operations are halted on the remaining commands. The remaining commands may not be
executed if command authorization is configured.
NOTE
Since RADIUS command authorization relies on a list of commands received from the RADIUS server
when authentication is performed, it is important that you use RADIUS authentication when you also
use RADIUS command authorization.
RADIUS configuration considerations
You must deploy at least one RADIUS server in your network.
Dell PowerConnect devices support authentication using up to eight RADIUS servers, including
those used for 802.1X authentication and for management. The device tries to use the servers
in the order you add them to the device configuration. If one RADIUS server times out (does not
respond), the Dell PowerConnect device tries the next one in the list. Servers are tried in the
same sequence each time there is a request.
You can optionally configure a RADIUS server as a port server, indicating that the server will be
used only to authenticate users on ports to which it is mapped, as opposed to globally
authenticating users on all ports of the device. In earlier releases, all configured RADIUS
servers are “global” servers and apply to users on all ports of the device. Refer to “Configuring
a RADIUS server per port” on page 1189.
User enters system commands
(for example, reload, boot system)
Command authorization:
aaa authorization commands <privilege-level> default <method-list>
Command accounting:
aaa accounting commands <privilege-level> default start-stop <method-list>
System accounting stop:
aaa accounting system default start-stop <method-list>
User enters the command:
[no] aaa accounting system default
start-stop <method-list>
Command authorization:
aaa authorization commands <privilege-level> default <method-list>
Command accounting:
aaa accounting commands <privilege-level> default start-stop <method-list>
System accounting start:
aaa accounting system default start-stop <method-list>
User enters other commands Command authorization:
aaa authorization commands <privilege-level> default <method-list>
Command accounting:
aaa accounting commands <privilege-level> default start-stop <method-list>
User action Applicable AAA operations