Skip to main content
  • Place orders quickly and easily
  • View orders and track your shipping status
  • Create and access a list of your products
  • Manage your Dell EMC sites, products, and product-level contacts using Company Administration.

Dell PowerEdge FN I/O Module Configuration Guide 9.10(0.0)

PDF

Choosing TACACS+ as the Authentication Method

One of the login authentication methods available is TACACS+ and the user’s name and password are sent for authentication to the TACACS hosts specified.

To use TACACS+ to authenticate users, specify at least one TACACS+ server for the system to communicate with and configure TACACS+ as one of your authentication methods.

To select TACACS+ as the login authentication method, use the following commands.

  1. Configure a TACACS+ server host. CONFIGURATION mode tacacs-server host { ip-address | host} Enter the IP address or host name of the TACACS+ server. Use this command multiple times to configure multiple TACACS+ server hosts.
  2. Enter a text string (up to 16 characters long) as the name of the method list you wish to use with the TACAS+ authentication method. CONFIGURATION mode aaa authentication login { method-list-name | default} tacacs+ [ ...method3] The TACACS+ method must not be the last method specified.
  3. Enter LINE mode. CONFIGURATION mode line {aux 0 | console 0 | vty number [ end-number]}
  4. Assign the method-list to the terminal line. LINE mode login authentication { method-list-name | default}

Example of a Failed Authentication

To view the configuration, use the show config in LINE mode or the show running-config tacacs+ command in EXEC Privilege mode.

If authentication fails using the primary method, Dell Networking OS employs the second method (or third method, if necessary) automatically. For example, if the TACACS+ server is reachable, but the server key is invalid, Dell Networking OS proceeds to the next authentication method. In the following example, the TACACS+ is incorrect, but the user is still authenticated by the secondary method.

First bold line: Server key purposely changed to incorrect value.

Second bold line: User authenticated using the secondary method.

Dell(conf)#
                                 Dell(conf)#do show run aaa
                                 !
                                 aaa authentication enable default tacacs+ enable
                                 aaa authentication enable LOCAL enable tacacs+
                                 aaa authentication login default tacacs+ local
                                 aaa authentication login LOCAL local tacacs+
                                 aaa authorization exec default tacacs+ none
                                 aaa authorization commands 1 default tacacs+ none
                                 aaa authorization commands 15 default tacacs+ none
                                 aaa accounting exec default start-stop tacacs+
                                 aaa accounting commands 1 default start-stop tacacs+
                                 aaa accounting commands 15 default start-stop tacacs+
                                 Dell(conf)#
                                 Dell(conf)#do show run tacacs+
                                 !
                                 tacacs-server key 7 d05206c308f4d35b
                                 tacacs-server host 10.10.10.10 timeout 1
                                 
                                 
                              

Rate this content

Accurate
Useful
Easy to understand
Was this article helpful?
0/3000 characters
  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please select whether the article was helpful or not.
  Comments cannot contain these special characters: <>()\