Information
Local user names and passwords are configured on a per-switch basis and provide the most basic formof authentication. Enabled by default for all management access connection types - console, SSH, and https-server (REST).Local authentication is also often used as the fallback login method. Local authenticationcan provide a minimum-security level should the primary method fail, but does not completely disablemanagement access to the switch
Local authentication is a method where user credentials are stored directly on the AOS-CX switch itself, rather than relying on external authentication servers such as RADIUS/RadSec or TACACS+. This approach is particularly advantageous for infrastructures where remote authentication servers are either unavailable, unreliable, or impractical to deploy. This is especially important in small-scale networks, isolated environments, or edge deployments where remote servers may not be supported. Even in environments that support remote authentication servers, local authentication can serve as a fallback mechanism in case of server outages, network issues, or misconfigurations that prevent access to the remote server.
Solution
To configure a local administrator-level user named localadmin with interactive password entry:
switch(config)# user localadmin group administrators password
Enter password: **********
Confirm password: **********
Impact:
Using local authentication in AOS-CX switches ensures reliable access in environments without remote server support, enhancing operational continuity. It simplifies deployment and reduces costs by eliminating the need for external authentication infrastructure. However, it lacks scalability, centralized control, and advanced logging, which could limit its effectiveness in larger or more complex networks. Organizations must ensure strong password policies and physical security to mitigate potential vulnerabilities.