Authentication, authorization, and accounting
By default, no user authentication is configured, leaving the switch open to anyone with physical or remote access. ArubaOS-Switch provides a number of methods for authenticating users and preventing unauthorized management access to the device, ranging from basic password protection to role-based authentication using external servers.
Each management interface (console, SSH, and so on) allows configuration of a primary and secondary method of authenticating users. Aruba switches default to the following:
switch# show authentication Status and Counters - Authentication Information Login Attempts : 3 Lockout Delay : 0 Respect Privilege : Disabled Bypass Username For Operator and Manager Access : Disabled | Login Login Login Access Task | Primary Server Group Secondary -------------- + ----------- ------------ ---------- Console | Local None Telnet | Local None Port-Access | Local None Webui | Local None SSH | Local None Web-Auth | ChapRadius radius None MAC-Auth | ChapRadius radius None SNMP | Local None Local-MAC-Auth | Local None | Enable Enable Enable Access Task | Primary Server Group Secondary -------------- + ----------- ------------ ---------- Console | Local None Telnet | Local None Webui | Local None SSH | Local None
Port-access (802.1x), Web-Auth, and MAC-Auth are primarily means of securing the network from unauthorized users, not the switch itself, and are considered beyond the scope of this document.
The “Respect Privilege” option instructs the switch to allow the authenticating server to supply the privilege level of the user. See Server-supplied privilege level for more information.
If the primary authentication method fails (for example, all external authentication servers are unreachable), the secondary method will be used to authenticate users. In the above configuration, when no local usernames or passwords are configured, all users who connect to the switch are automatically granted manager-level permissions.
Most management interfaces permit three methods of authenticating users:
Local – uses locally created usernames and passwords.
RADIUS – uses an external RADIUS server.
TACACS+ – uses an external TACACS+ server.