.. _example_system_aaa_authorization_radius:
######
Radius
######
.. sidebar:: Contents
.. contents::
:depth: 2
:local:
****************************
Telnet Default Authorization
****************************
Description
===========
A RADIUS server is added to a RADIUS group which is
added to an AAA list. This list is assigned to the login system's
authentication. In this scenario, the default authorization mapping
is used, which maps the `standard` level to `monitor` and the
`privileged` level to `admin`. The device then starts a Telnet
session with itself to check that it can only run the commands that
role is authorized to run.
Scenario
========
.. include:: radius/telnetdefaultauthorization
.. raw:: html
********************
Telnet Privilege Map
********************
Description
===========
A RADIUS server is added to a RADIUS group which is
added to an AAA list. This list is assigned to login system's
authentication. Finally, the RADIUS privilege levels are mapped to
locally defined roles. The device then starts a Telnet session with
itself to check that it can only run the commands that role is
authorized to run.
Scenario
========
.. include:: radius/telnetprivilegemap
.. raw:: html
*************************
SSH Default Authorization
*************************
Description
===========
A RADIUS server is added to a RADIUS group which is
added to an AAA list. This list is assigned to the SSH service's
authentication. In this scenario, the default authorization mapping
is used, which maps the `standard` level to `monitor` and the
`privileged` level to `admin`. The device then starts an SSH
session with itself to check that it can only run the commands that
role is authorized to run.
Scenario
========
.. include:: radius/sshdefaultauthorization
.. raw:: html
*****************
SSH Privilege Map
*****************
Description
===========
A RADIUS server is added to a RADIUS group which is
added to an AAA list. This list is assigned to SSH service's
authentication. Finally, the RADIUS privilege levels are mapped to
locally defined roles. The device then starts an SSH session with
itself to check that it can only run the commands that role is
authorized to run.
Scenario
========
.. include:: radius/sshprivilegemap
.. raw:: html