Security
This chapter contains various types of security commands offered in the Dell Networking operating software.
The commands are listed in the following sections:
•
•
Authorization and Privilege Commands
•
•
Authentication and Password Commands
•
•
•
Port Authentication (802.1X) Commands
•
•
For configuration details, refer to the Security chapter in the
Dell Networking OS Configuration Guide
.
NOTE:
Starting with the Dell Networking OS version 7.2.1.0, LEAP with MSCHAP v2 supplicant is
implemented.
Topics:
•
Role-Based Access Control Commands
•
•
Authorization and Privilege Commands
•
Authentication and Password Commands
•
•
•
Port Authentication (802.1X) Commands
•
•
Role-Based Access Control Commands
With Role-Based Access Control (RBAC), access and authorization is controlled based on a user’s role. Users
are granted permissions based on their user roles, not on their individual user ID. User roles are created for
job functions and through those roles they acquire the permissions to perform their associated job function.
This section describes the syntax and usage of RBAC-specific commands. You can find information on other
related security commands in this chapter:
51
Security
1913
Summary of Contents for C9000 series
Page 1: ...Dell Networking Command Line Reference Guide for the C9000 Series Version 9 10 0 0 ...
Page 394: ...deny 14551 666 Dell Access Control Lists ACL 394 ...
Page 877: ...algorithm FIPS Cryptography 877 ...
Page 1297: ...Total 5 0 Total 5 active route s using 952 bytes IPv6 Basics 1297 ...