Configuring AAA
Configuring AAA
This section describes the tasks for configuring AAA on Cisco NX-OS devices.
Note
If you are familiar with the Cisco IOS CLI, be aware that the Cisco NX-OS commands for this feature might
differ from the Cisco IOS commands that you would use.
Note
Cisco Nexus 9K Series switches support the CLI command, aaa authentication login ascii-authentication, only
for TACAAS+, but not for RADIUS. Ensure that you have disabled aaa authentication login ascii-authentication
switch so that the default authentication, PAP, is enabled. Otherwise, you will see syslog errors.
Process for Configuring AAA
Follow these steps to configure AAA authentication and accounting:
1. If you want to use remote RADIUS, TACACS+, or LDAP servers for authentication, configure the hosts
on your Cisco NX-OS device.
2. Configure console login authentication methods.
3. Configure default login authentication methods for user logins.
4. Configure default AAA accounting default methods.
Configuring Console Login Authentication Methods
This section describes how to configure the authentication methods for the console login.
The authentication methods include the following:
• Global pool of RADIUS servers
• Named subset of RADIUS, TACACS+, or LDAP servers
• Local database on the Cisco NX-OS device
• Username only (none)
The default method is local, but you have the option to disable it.
Note
The group radius and group server-name forms of the aaa authentication command refer to a set of
previously defined RADIUS servers. Use the radius-server host command to configure the host servers.
Use the aaa group server radius command to create a named group of servers.
Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x
Configuring AAA
15