Users who are authenticated through RADIUS or TACACS+ can be restricted to certain sets of commands and virtual routers (VRs). The levels of access are shown in Table 52. For information about TACACS+, see JUNOSe Broadband Access Configuration Guide.
-
Table 52: CLI User Access Levels
You can use RADIUS authentication to specify a level of commands that a user is allowed. If you do not configure RADIUS authentication for the console or virtual terminals, all users who successfully log in are automatically granted Level 1 access.
The vendor-specific attribute (VSA) Admin-Auth-Level supports the levels of access shown in Table 52. In addition to VSA access level support, the software provides access to levels 1 and 10 through the Initial-Auth-Level in the standard RADIUS Service-Type attribute. If the RADIUS Service-Type attribute is included in the RADIUS Access-Accept message, the standard attribute overrides any VSA setting.
If you are using the RADIUS Service-Type attribute to assign access levels, the system sets the Initial-Auth-Level as follows:
After a user has been authenticated through RADIUS, the RADIUS server provides the E-series router with the names of the privilege levels (for example, “ 10” ) that the user has enable access to. When the user attempts to access a privilege level through the enable command, the system either denies or approves the user’s request.
The decision to deny or approve the user’s request is based on the list the system received through RADIUS. See Table 53.
Table 53: Juniper Networks–Specific CLI Access VSA Descriptions
-
![]() |
Note: All levels to which a user can have access must explicitly be specified in the Admin-Auth-Set VSA. |
The user is not prompted for a password, because the system knows whether or not the user should have access to the requested level. If the user is not authenticated through RADIUS, the router uses the system-wide enable passwords instead.
You can use RADIUS authentication to specify whether users can access all virtual routers (VRs), one specific VR, or a set of specific VRs.
![]() |
Note: This classification is independent of the command access levels configurable through the Initial-CLI-Access-Level VSA. |
The VSA Allow-All-VR-Access controls access; the VSA Virtual-Router controls the VR to which the user logs in, and the VSA Alt-CLI-Virtual-Router-Name specifies which VRs other than the VR specified by the VSA virtual-router are accessible to restricted users. See Table 54.
Table 54: Juniper Networks–Specific Virtual Router Access VSA Descriptions
Consider a router on which five VRs have been configured. The VRs are called Boston, Chicago, Detroit, Los Angeles, and San Francisco. The following examples illustrate how to use the VSAs to control a user’s access to these VRs.
Example 1
In this example, you want the user to have access to all VRs and to log in to the default VR. Accept the default setting or set the following VSA:
Example 2
In this example, you want the user to have access to all VRs and to log in to the VR Boston. Set the VSAs as follows:
Example 3
In this example, you want the user to have access only to the VR Boston. Set the VSAs as follows:
Example 4
In this example, you want the user to log in to VR Boston, and to have access to VRs Chicago, Los Angeles, and San Francisco. Set the VSAs as follows:
If you do not configure RADIUS authentication for the console or virtual terminals, there are no restrictions on VR access for any user who successfully logs in to the router. For example, nonrestricted users can:
User restricted to one or a set of specific VRs can see and use only a limited set of commands to monitor the status of those VRs and view some configuration settings on those VRs. More specifically, such users:
The following table lists some, but not all, commands accessed from Exec mode that are available only to users with no VR restriction: