DELL S50V User Manual

Page of 1262
Security | 917
AAA Authentication
FTOS supports a distributed client/server system implemented through Authentication, Authorization, and 
Accounting (AAA) to help secure networks against unauthorized access. In the Dell Force10 
implementation, the Dell Force10 system acts as a RADIUS or TACACS+ client and sends authentication 
requests to a central RADIUS or TACACS+ server that contains all user authentication and network 
service access information. 
Dell Force10 uses local usernames/passwords (stored on the Dell Force10 system) or AAA for login 
authentication. With AAA, you can specify the security protocol or mechanism for different login methods 
and different users. In FTOS, AAA uses a list of authentication methods, called method lists, to define the 
types of authentication and the sequence in which they are applied. You can define a method list or use the 
default method list. User-defined method lists take precedence over the default method list.
Configuration Task List for AAA Authentication
The following sections provide the configuration tasks:
For a complete listing of all commands related to login authentication, refer to the Security chapter in the 
FTOS Command Reference.
Configure login authentication for terminal lines
You can assign up to five authentication methods to a method list. FTOS evaluates the methods in the order 
in which you enter them in each list. If the first method list does not respond or returns an error, FTOS 
applies the next method list until the user either passes or fails the authentication. If the user fails a method 
list, FTOS does not apply the next method list.