4. UnderServer Rules, click New to add a server derivation rule.
a. For Condition, enter Role.
b. Selectvalue-of from the drop-down menu.
c. Select Set Role from the drop-down menu.
d. ClickA dd.
5. Click Apply.
Using the CLI
(host)(config) #aaa server-group internal
set role condition Role value-of
Assigning Serv er Groups
You can create server groupsfor the following purposes:
luserauthenticati on
lmanagementauthentication
laccounting
You can configureall types ofservers for user and managementauthentication (seeTable 56). Accounting is only
supportedw ith RADIUS and TACACS+ servers when RADIUS o rTA CACS+ is used for authentication.

RADIUS TACACS+ LDAP InternalDatabase

Userauthentication Yes Yes Yes Yes
Managementauthentication Yes Yes Yes Yes
Accounting Yes Yes No No

Table56 :

ServerTypes and Purposes

User Authe ntication

For information about assigning a server group for userauthenticat ion, referto the
Rolesand Policies
chaptero f the
Dell PowerConnectW-
ArubaOS
User Guide
.

Management Authentication

Users who needt o access the controllerto monitor,manage, or configurethe Dell user-centric network can be
authenticated with RADIUS, TACA CS+,o r LDAP servers or the internal database.
NOTE:Only user record attributes are returned upon a successfulauthentication. Therefore, to derive a different
management role other thanthe default mgmt auth role, set the server derivation rule based on the user attributes.
Using the WebUI
1. Navigate to the Configuration > Management > Administrat ion page.
2. Underthe Management Authentication Servers section, select the Server Group.
3. Click Apply.
Using the CLI
(host)(config) #aaa authentication mgmt
DellPowerConnect W- Series ArubaOS 6.2 | User Guide AuthenticationServers | 184