accounting exec execAcctExample of Enabling AAA Accounting with a Named Method ListDell(config-line-vty)# accounting commands 15 com15Dell(config-line-vty)# accounting exec execAcctMonitoring AAA AccountingDell Networking OS does not support periodic interim accounting because the periodic command cancause heavy congestion when many users are logged in to the network.No specific show command exists for TACACS+ accounting.To obtain accounting records displaying information about users currently logged in, use the followingcommand.• Step through all active sessions and print all the accounting records for the actively accountedfunctions.CONFIGURATION mode or EXEC Privilege modeshow accountingExample of the show accounting Command for AAA AccountingDell#show accountingActive accounted actions on tty2, User admin Priv 1Task ID 1, EXEC Accounting record, 00:00:39 Elapsed, service=shellActive accounted actions on tty3, User admin Priv 1Task ID 2, EXEC Accounting record, 00:00:26 Elapsed, service=shellDell#AAA AuthenticationDell Networking OS supports a distributed client/server system implemented through authentication,authorization, and accounting (AAA) to help secure networks against unauthorized access.In the Dell Networking implementation, the Dell Networking system acts as a RADIUS or TACACS+ clientand sends authentication requests to a central remote authentication dial-in service (RADIUS) or Terminalaccess controller access control system plus (TACACS+) server that contains all user authentication andnetwork service access information.Dell Networking uses local usernames/passwords (stored on the Dell Networking system) or AAA for loginauthentication. With AAA, you can specify the security protocol or mechanism for different login methodsand different users. In Dell Networking OS, AAA uses a list of authentication methods, called method lists,to define the types of authentication and the sequence in which they are applied. You can define amethod list or use the default method list. User-defined method lists take precedence over the defaultmethod list.NOTE: If a console user logs in with RADIUS authentication, the privilege level is applied from theRADIUS server if the privilege level is configured for that user in RADIUS, whether you configureRADIUS authorization.NOTE: RADIUS and TACACS servers support VRF-awareness functionality. You can create RADIUSand TACACS groups and then map multiple servers to a group. The group to which you mapmultiple servers is bound to a single VRF.Security 773