netoperator
netadmin Exec Config Interface Router IP Route-map Protocol MAC
secadmin Exec Config Line
sysadmin Exec Config Interface Line Router IP Route-map Protocol MAC
User Roles
This section describes how to create a new user role and configure command permissions and contains the following topics.
•
•
Modifying Command Permissions for Roles
•
Adding and Deleting Users from a Role
Creating a New User Role
Instead of using the system defined user roles, you can create a new user role that best matches your organization. When you create a new
user role, you can first inherit permissions from one of the system defined roles. Otherwise you would have to create a user role’s command
permissions from scratch. You then restrict commands or add commands to that role
NOTE:
You can change user role permissions on system pre-defined user roles or user-defined user roles.
Important Points to Remember
Consider the following when creating a user role:
•
Only the system administrator and user-defined roles inherited from the system administrator can create roles and user names. Only the
system administrator, security administrator, and roles inherited from these can use the "role" command to modify command
permissions. The security administrator and roles inherited by security administrator can only modify permissions for commands they
already have access to.
•
Make sure you select the correct role you want to inherit.
•
If you inherit a user role, you cannot modify or delete the inheritance. If you want to change or remove the inheritance, delete the user
role and create it again. If the user role is in use, you cannot delete the user role.
1
Create a new user role
CONFIGURATION mode
userrole name [inherit
existing-role-name
]
2
Verify that the new user role has inherited the security administrator permissions.
Dell(conf)#do show userroles
EXEC Privilege mode
3
After you create a user role, configure permissions for the new user role.
Example of Creating a User Role
The configuration in the following example creates a new user role,
myrole
, which inherits the security administrator (secadmin)
permissions.
Create a new user role,
myrole
and inherit security administrator permissions.
Dell(conf)#userrole myrole inherit secadmin
728
Security
Summary of Contents for S3048-ON
Page 1: ...Dell Configuration Guide for the S3048 ON System 9 11 2 5 ...
Page 137: ...0 Gi 1 1 Gi 1 2 rx Flow N A N A 0 0 No N A N A yes Access Control Lists ACLs 137 ...
Page 142: ...Figure 10 BFD Three Way Handshake State Changes 142 Bidirectional Forwarding Detection BFD ...
Page 241: ...Dell Control Plane Policing CoPP 241 ...
Page 287: ... RPM Synchronization GARP VLAN Registration Protocol GVRP 287 ...
Page 428: ...Figure 53 Inspecting the LAG Configuration 428 Link Aggregation Control Protocol LACP ...
Page 477: ...Figure 73 Configuring Interfaces for MSDP Multicast Source Discovery Protocol MSDP 477 ...
Page 478: ...Figure 74 Configuring OSPF and BGP for MSDP 478 Multicast Source Discovery Protocol MSDP ...
Page 483: ...Figure 77 MSDP Default Peer Scenario 2 Multicast Source Discovery Protocol MSDP 483 ...
Page 484: ...Figure 78 MSDP Default Peer Scenario 3 484 Multicast Source Discovery Protocol MSDP ...
Page 745: ...Figure 104 Single and Double Tag TPID Match Service Provider Bridging 745 ...
Page 746: ...Figure 105 Single and Double Tag First byte TPID Match 746 Service Provider Bridging ...