
line console 0
login authentication test
authorization exec test
exec-timeout 0 0
line vty 0
login authentication test
authorization exec test
line vty 1
login authentication test
authorization exec test
To enable role-based only AAA authorization:
Dell(conf)#aaa authorization role-only
System-Defined RBAC User Roles
By default, the Dell Networking OS provides 4 system defined user roles. You can create up to 8 additional user roles.
NOTE: You cannot delete any system defined roles.
The system defined user roles are as follows:
•
Network Operator (netoperator) - This user role has no privilege to modify any configuration on the switch. You can access Exec
mode (monitoring) to view the current configuration and status information.
•
Network Administrator (netadmin): This user role can configure, display, and debug the network operations on the switch. You
can access all of the commands that are available from the network operator user role. This role does not have access to the
commands that are available to the system security administrator for cryptography operations, AAA, or the commands reserved
solely for the system administrator.
•
Security Administrator (secadmin): This user role can control the security policy across the systems that are within a domain or
network topology. The security administrator commands include FIPS mode enablement, password policies, inactivity timeouts,
banner establishment, and cryptographic key operations for secure access paths.
•
System Administrator (sysadmin). This role has full access to all the commands in the system, exclusive access to commands
that manipulate the file system formatting, and access to the system shell. This role can also create user IDs and user roles.
The following summarizes the modes that the predefined user roles can access.
Role Modes
netoperator
netadmin Exec Config Interface Router IP Route-map Protocol MAC
secadmin Exec Config Line
sysadmin Exec Config Interface Line Router IP Route-map Protocol MAC
User Roles
This section describes how to create a new user role and configure command permissions and contains the following topics.
•
•
Modifying Command Permissions for Roles
•
Adding and Deleting Users from a Role
Creating a New User Role
Instead of using the system defined user roles, you can create a new user role that best matches your organization. When you create
a new user role, you can first inherit permissions from one of the system defined roles. Otherwise you would have to create a user
762
Security
Summary of Contents for S4048-ON
Page 1: ...Dell Configuration Guide for the S4048 ON System 9 9 0 0 ...
Page 146: ...Figure 14 BFD Three Way Handshake State Changes 146 Bidirectional Forwarding Detection BFD ...
Page 522: ...Figure 87 Configuring Interfaces for MSDP 522 Multicast Source Discovery Protocol MSDP ...
Page 523: ...Figure 88 Configuring OSPF and BGP for MSDP Multicast Source Discovery Protocol MSDP 523 ...
Page 528: ...Figure 91 MSDP Default Peer Scenario 1 528 Multicast Source Discovery Protocol MSDP ...
Page 529: ...Figure 92 MSDP Default Peer Scenario 2 Multicast Source Discovery Protocol MSDP 529 ...
Page 530: ...Figure 93 MSDP Default Peer Scenario 3 530 Multicast Source Discovery Protocol MSDP ...
Page 633: ...Policy based Routing PBR 633 ...
Page 777: ...Figure 119 Single and Double Tag TPID Match Service Provider Bridging 777 ...
Page 778: ...Figure 120 Single and Double Tag First byte TPID Match 778 Service Provider Bridging ...