There, Configuring a radius server to authenticate rbm – Brocade Virtual ADX Administration Guide (Supporting ADX v03.1.00) User Manual
Page 123

Brocade Virtual ADX Administration Guide
111
53-1003249-01
Integrating RBM with RADIUS and TACACS+
3
Configuring a Brocade Virtual ADX for authentication by a TACACS+ server
To configure a Brocade Virtual ADX authenticated by a TACACS+ server, refer to
on page 69. The following example is a standard Brocade Virtual ADX
configuration to enable AAA authentication and authorization by a TACACS+ server with the
following settings:
•
Default authentication for web-server access is provided locally.
•
Executive authorization is configured to have the user’s privilege level authorized by a TACACS+
server.
•
TACACS+ is set as the default authentication method for login.
•
The server at IP address 10.10.10.10 is identified as the TACACS+ server.
Virtual ADX(config)# aaa authentication login default tacacs+
Virtual ADX(config)# aaa authorization exec default tacacs+
Virtual ADX(config)# tacacs-server host 10.10.10.10 auth-port 49 default key 1
$D?@d=8
Configuring a role template at the global level (RADIUS or TACACS+)
The following example shows how to configure a role template named “brcd” on a Brocade Virtual
ADX at the global level and associate the template to the user named “user1.”
Virtual ADX(config)# role template brcd
Virtual ADX(config-role-template-r1)# context c1 operator
Virtual ADX(config-role-template-r1)# context c2 manager
Virtual ADX(config-role-template-r1)# context c3 viewer
Virtual ADX(config-role-template-r1)# exit
Virtual ADX(config)# username user1 privilege 1 password pass2
Virtual ADX(config-role-user-user1)# role template brcd
Configuring the AAA server to authenticate RBM
on a Brocade Virtual ADX
The AAA server must be configured to authenticate RBM on the Brocade Virtual ADX for RADIUS or
TACACS+.
Configuring a RADIUS server to authenticate RBM
Add the following configuration to the file “/usr/local/etc/raddb/users” for the RADIUS server to
authenticate RBM. The “SIContextRole” and “SIRoleTemplate” template settings must reflect the
settings in the specified RBM role template configured on the Brocade Virtual ADX.
aaaserver1
Cleartext-Password : = "pass"
foundry-privilege-Level = 1,
SIContextRole = "c1+operator;c2+viewer;*c3+manager",
SIRoleTemplate = “default”
Syntax: SIContextRole :context+role