{"id":6378,"date":"2026-05-04T12:10:35","date_gmt":"2026-05-04T12:10:35","guid":{"rendered":"http:\/\/docs.connexite.co.uk\/index.php\/docs\/connexite-documentation\/synapse-cli-documentation\/cli-configuring-aaa\/"},"modified":"2026-05-04T12:19:10","modified_gmt":"2026-05-04T12:19:10","slug":"cli-configuring-aaa","status":"publish","type":"docs","link":"https:\/\/docs.connexite.co.uk\/index.php\/docs\/network\/synapse-cli-documentation\/cli-configuring-aaa\/","title":{"rendered":"Configuring AAA"},"content":{"rendered":"<h2 class=\"connexite-doc-h2\">Overview of AAA<\/h2>\n<p>AAA is the abbreviation of Authentication Authorization and Accounting, which provides for authentication, authorization and accounting function into the configuration of the consistency framework. AAA provides the following services in a modular fashion:<\/p>\n<ul class=\"connexite-doc-list\">\n<li>Authentication: Verify whether the user can obtain access rights. Optionally use RADIUS protocol, TACACS+ protocol or Local (local) and so on. Identity authentication is a method of identifying a user&#039;s identity before allowing access to the network and network services.<\/li>\n<li>Authorization: Which services are available to authorized users. AAA authorization is achieved by defining a series of attribute pairs, these attribute pairs describe the operations that the user is authorized to perform. These attribute pairs can be stored on a network device or remotely on a secure server.<\/li>\n<li>Accounting: record the user&#039;s use of network resources. When AAA accounting is enabled, the network device starts to send user usage of network resources. Each accounting record is composed of attribute pairs and stored on a secure server. These records can be read and analyzed by special software, so as to realize accounting, statistics and tracking of users&#039; use of network resources.<\/li>\n<\/ul>\n<p>Using AAA has the following advantages:<\/p>\n<ul class=\"connexite-doc-list\">\n<li>Flexibility and controllability.<\/li>\n<li>Scalability.<\/li>\n<li>Standardized Certification.<\/li>\n<li>Multiple backup systems.<\/li>\n<\/ul>\n<p>AAA has the following relevant standards: RFC2865 Remote Authentication Dial In User Service (RADIUS). C. Rigney, S. Willens, A. Rubens, W. Simpson. June 2000. (Format: TXT, HTML). RFC2866 RADIUS Accounting. C. Rigney. June 2000. (Format: TXT, HTML). RFC8907 The Terminal Access Controller Access-Control System Plus (TACACS+) Protocol. T. Dahm, A. Ota, DC Medway Gash, D. Carrel, L. Grant. September 2020.<\/p>\n<h2 class=\"connexite-doc-h2\">Configuring<\/h2>\n<ul class=\"connexite-doc-list\">\n<li>Enabling\/disabling AAA Function Globally<\/li>\n<\/ul>\n<pre class=\"connexite-doc-command\"><code>SWITCH( config)# aaa new-model<\/code><\/pre>\n<pre class=\"connexite-doc-command\"><code>SWITCH( config)# no aaa new-model<\/code><\/pre>\n<p class=\"connexite-doc-command-desc\">Globally enable or disable the AAA function.<\/p>\n<pre class=\"connexite-doc-command\"><code>SWITCH( config)# aaa group server (radius) ( default| NAME )<\/code><\/pre>\n<pre class=\"connexite-doc-command\"><code>SWITCH( config ) # aaa group server ( tacacs + ) ( default| NAME )<\/code><\/pre>\n<pre class=\"connexite-doc-command\"><code>SWITCH( config)# no aaa group server ( radius|tacacs +) ( default| NAME )<\/code><\/pre>\n<p class=\"connexite-doc-command-desc\">Server group configuration. Optional. By default there is no server group configuration and no server method is used.<\/p>\n<pre class=\"connexite-doc-command\"><code>SWITCH(config-gs-rad )# server A.B.C.D (auth-port &lt;1-65535&gt; |) (acct-port &lt;1-65535&gt; |) (key STRING )<\/code><\/pre>\n<pre class=\"connexite-doc-command\"><code>SWITCH(config-gs-tac)# server A.B.C.D (port &lt;1-65535&gt; |) (key STRING )<\/code><\/pre>\n<pre class=\"connexite-doc-command\"><code>SWITCH(config-gs-rad)# no server A.B.C.D<\/code><\/pre>\n<pre class=\"connexite-doc-command\"><code>SWITCH(config-gs-tac)# no server A.B.C.D<\/code><\/pre>\n<p class=\"connexite-doc-command-desc\">server group mode . Configure RADIUS, TACACS + server information, including basic IP address, port information, shared key Optional. Note: Due to implementation restrictions, the current radius accounting port number is always the authentication port number + 1, and the configuration is invalid.<\/p>\n<pre class=\"connexite-doc-command\"><code>SWITCH(config-gs-rad)# timeout &lt;1-120&gt;<\/code><\/pre>\n<pre class=\"connexite-doc-command\"><code>SWITCH(config-gs-tac)# timeout &lt;1-120&gt;<\/code><\/pre>\n<pre class=\"connexite-doc-command\"><code>SWITCH(config-gs-rad)# no timeout<\/code><\/pre>\n<pre class=\"connexite-doc-command\"><code>SWITCH(config-gs-tac)# no timeout<\/code><\/pre>\n<p class=\"connexite-doc-command-desc\">server group mode . Configure the timeout period for servers in the group. Optional.<\/p>\n<pre class=\"connexite-doc-command\"><code>SWITCH(config-gs-tac)# service NAME<\/code><\/pre>\n<pre class=\"connexite-doc-command\"><code>SWITCH(config-gs-tac)# no service<\/code><\/pre>\n<p class=\"connexite-doc-command-desc\">TACACS+ server group mode . Configure the service information in the group. Optional.<\/p>\n<pre class=\"connexite-doc-command\"><code>SWITCH(config)# aaa (authentication|authorization|accounting) (login|ssh|web|dot1x|command) default {group (radius|tacacs+|NAME)|local|none}<\/code><\/pre>\n<pre class=\"connexite-doc-command\"><code>SWITCH(config)#no aaa (authentication|authorization|accounting) (login|ssh|web|dot1x|command) default<\/code><\/pre>\n<p class=\"connexite-doc-command-desc\">Global configuration mode. Configure AAA method information. Optional.Local authentication is used by default. Note1: The username (such as admin) that exists on the machine also needs to be provided during the none authentication, otherwise an error may occur. Note2: Web do not support accounting\/authorization now.<\/p>\n<h2 class=\"connexite-doc-h2\">Examples<\/h2>\n<p>SSH Login Authentication Using Tacacs+ Method \u200f \u2022 Requirements<\/p>\n<ul class=\"connexite-doc-list\">\n<li>See the description of the network diagram<\/li>\n<\/ul>\n<p>\u200f \u2022 Network diagram Figure 8 Typical networking diagram for SSH through tacacs+ server authentication and accounting Description: none \u200f \u2022 Typical configuration example Switch\uff1a<\/p>\n<pre class=\"connexite-doc-command\"><code>SWITCH(config)# aaa new-model<\/code><\/pre>\n<pre class=\"connexite-doc-command\"><code>SWITCH(config)# aaa group server tacacs+ default<\/code><\/pre>\n<pre class=\"connexite-doc-command\"><code>SWITCH(config-gs-tac) # server 2.2.2.106 key testkey123<\/code><\/pre>\n<pre class=\"connexite-doc-command\"><code>SWITCH(config-gs-tac)# exit<\/code><\/pre>\n<pre class=\"connexite-doc-command\"><code>SWITCH(config)# aaa authentication ssh default group tacacs+<\/code><\/pre>\n<pre class=\"connexite-doc-command\"><code>SWITCH(config)# aaa accounting ssh default group tacacs+<\/code><\/pre>\n<pre class=\"connexite-doc-command\"><code>SWITCH(config)# username test remote<\/code><\/pre>\n<p class=\"connexite-doc-command-desc\">Device IP configuration and ssh configuration refer to the corresponding chapters in the configuration documentation, which are omitted here.<\/p>\n<h2 class=\"connexite-doc-h2\">Use the None Method to Perform Serial Port Login<\/h2>\n<p>\u200f \u2022 Requirements<\/p>\n<ul class=\"connexite-doc-list\">\n<li>See the description of the network diagram<\/li>\n<\/ul>\n<p>\u200f \u2022 Network diagram Figure9 Typical network diagram of serial port using none authentication and accounting \u200f \u2022 Typical configuration example Refer to the network diagram<\/p>\n<h2 class=\"connexite-doc-h2\">Display Information<\/h2>\n<ul class=\"connexite-doc-list\">\n<li>None<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Networking \u203a Switching \u203a Edge \u203a Synapse<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":6349,"menu_order":29,"comment_status":"open","ping_status":"closed","template":"","doc_tag":[115,119,116],"class_list":["post-6378","docs","type-docs","status-publish","hentry","doc_tag-connexite","doc_tag-network","doc_tag-synapse-cli-documentation","no-post-thumbnail"],"acf":[],"_links":{"self":[{"href":"https:\/\/docs.connexite.co.uk\/index.php\/wp-json\/wp\/v2\/docs\/6378","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/docs.connexite.co.uk\/index.php\/wp-json\/wp\/v2\/docs"}],"about":[{"href":"https:\/\/docs.connexite.co.uk\/index.php\/wp-json\/wp\/v2\/types\/docs"}],"author":[{"embeddable":true,"href":"https:\/\/docs.connexite.co.uk\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/docs.connexite.co.uk\/index.php\/wp-json\/wp\/v2\/comments?post=6378"}],"version-history":[{"count":1,"href":"https:\/\/docs.connexite.co.uk\/index.php\/wp-json\/wp\/v2\/docs\/6378\/revisions"}],"predecessor-version":[{"id":6426,"href":"https:\/\/docs.connexite.co.uk\/index.php\/wp-json\/wp\/v2\/docs\/6378\/revisions\/6426"}],"up":[{"embeddable":true,"href":"https:\/\/docs.connexite.co.uk\/index.php\/wp-json\/wp\/v2\/docs\/6349"}],"wp:attachment":[{"href":"https:\/\/docs.connexite.co.uk\/index.php\/wp-json\/wp\/v2\/media?parent=6378"}],"wp:term":[{"taxonomy":"doc_tag","embeddable":true,"href":"https:\/\/docs.connexite.co.uk\/index.php\/wp-json\/wp\/v2\/doc_tag?post=6378"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}