Remote authentication, Remote authentication configuration, Client/server model – Dell POWEREDGE M1000E User Manual

Page 149

Advertising
background image

Fabric OS Administrator’s Guide

149

53-1002745-02

Remote authentication

5

The passwd command applies only to the boot PROM password when it is entered from the
boot interface.

8. Enter the boot PROM password at the prompt, and then re-enter it when prompted.

The password must be eight alphanumeric characters (any additional characters are not
recorded). Record this password for future use.

9. Enter the saveEnv command to save the new password.

10. Reboot the standby CP blade by entering the reset command.

11. Connect to the active CP blade by serial or Telnet and enter the haEnable command to restore

high availability, and then fail over the active CP blade by entering the haFailover command.

Traffic resumes flowing through the newly active CP blade after it has completed rebooting.

12. Connect the serial cable to the serial port on the new standby CP blade (previously the active

CP blade).

13. Repeat

step 3

through

step 10

for the new standby CP blade.

14. Connect to the active CP blade over a serial or Telnet connection and enter the haEnable

command to restore high availability.

NOTE

To recover lost passwords refer to the Fabric OS Troubleshooting and Diagnostics Guide.

Remote authentication

Fabric OS supports user authentication through the local user database or one of the following
external authentication services:

Remote authentication dial-in user service (RADIUS)

Lightweight directory access protocol (LDAP) using Microsoft Active Directory in Windows or
OpenLDAP in Linux.

Terminal Access Controller Access-Control System Plus (TACACS+)

Remote Authentication Configuration

A switch can be configured to try one of the supported remote authentication services (RADIUS,
LDAP, or TACACS+) and local switch authentication. The switch can also be configured to use only a
remote authentication service, or only local switch authentication.

Client/server model

When configured to use one of the supported remote authentication services, the switch acts as a
network access server (NAS) and RADIUS, LDAP, or TACACS+ client. The switch sends all
authentication, authorization, and accounting (AAA) service requests to the authentication server.
The authentication server receives the request, validates the request, and sends its response back
to the switch.

Advertising