![Dell Force10 C150 Configuration Manual Manual pdf 928 page image](https://manuals-archive2.s3.amazonaws.com/3014915/0ebbf9ad9a5f1377a75a2b9bb5616bb7928f.jpg)
928 | Securityw w w . d e l l . c o m | s u p p o r t . d e l l . c o m Auto-commandYou can configure the system through the RADIUS server to automatically execute a command when youconnect to a specific line. To do this, use the command auto-command. The auto-command is executedwhen the user is authenticated and before the prompt appears to the user.Set access to privilege levels through RADIUSThrough the RADIUS server, you can use the command privilege level to configure a privilege level for theuser to enter into when they connect to a session.This value is configured on the client system.Configuration Task List for RADIUSTo authenticate users using RADIUS, at least one RADIUS server must be specified so that the system cancommunicate with and configure RADIUS as one of your authentication methods.The following list includes the configuration tasks for RADIUS.• Define a aaa method list to be used for RADIUS on page 928 (mandatory)• Apply the method list to terminal lines on page 929 (mandatory except when using default lists)• Specify a RADIUS server host on page 929 (mandatory)• Set global communication parameters for all RADIUS server hosts on page 930 (optional)• Monitor RADIUS on page 931 (optional)For a complete listing of all FTOS commands related to RADIUS, refer to the Security chapter in theFTOS Command Reference.To view the configuration, use the show config in the LINE mode or the show running-config command inthe EXEC Privilege mode.Define a AAA method list to be used for RADIUSTo configure RADIUS to authenticate or authorize users on the system, you must create a AAA methodlist. Default method lists do not need to be explicitly applied to the line, so they are not mandatory. Tocreate a method list, enter one of the following commands in CONFIGURATION mode:Note: RADIUS authentication and authorization are done in a single step. Hence, authorization cannot beused independent of authentication. However, if RADIUS authorization is configured and authentication isnot, then a message is logged stating this. During authorization, the next method in the list (if present) isused, or if another method is not present, an error is reported.Command Syntax Command Mode Purposeaaa authentication loginmethod-list-name radiusCONFIGURATION Enter a text string (up to 16 characters long) as the nameof the method list you wish to use with the RADIUSauthentication method.