Defaults
none
Command Modes
CONFIGURATION
Command History
Version
Description
9.9(0.0)
Introduced on the C9010.
9.5(0.0)
Introduced on the Z9000, S6000, S4820T, S4810, MXL.
Usage Information Instead of using the system defined user roles, you can create a new user role that best
matches your organization. When you create a new user role, you first inherit
permissions from one of the system defined roles. Otherwise you would have to create
a user role from scratch. You then restrict commands or add commands to that role.
For information about this topic, See
Modifying Command Permissions for Roles
.
NOTE:
You can change user role permissions on system pre-defined user roles or
user-defined user roles.
Important Points to Remember
Consider the following when creating a user role:
• Only the system administrator and user-defined roles inherited from the system
administrator can create roles and usernames. Only the system administrator,
security administrator, and roles inherited from these can use the
role
command
to modify command permissions. The security administrator and roles inherited
by security administrator can only modify permissions for commands they already
have access to.
• Make sure you select the correct role you want to inherit.
NOTE:
If you inherit a user role, you cannot modify or delete the inheritance. If
you want to change or remove the inheritance, delete the user role and create it
again. If the user role is in use, you cannot delete the user role.
AAA Accounting Commands
AAA Accounting enables tracking of services that users are accessing and the amount of network resources
being consumed by those services. When you enable AAA Accounting, the network server reports user
activity to the security server in the form of accounting records. Each accounting record is
comprised of accounting AV pairs and is stored on the access control server.
As with authentication and authorization, you must configure AAA Accounting by defining a named list of
accounting methods, and then applying that list to various interfaces.
Security
1918
Содержание C9000 series
Страница 1: ...Dell Networking Command Line Reference Guide for the C9000 Series Version 9 10 0 0 ...
Страница 394: ...deny 14551 666 Dell Access Control Lists ACL 394 ...
Страница 877: ...algorithm FIPS Cryptography 877 ...
Страница 1297: ...Total 5 0 Total 5 active route s using 952 bytes IPv6 Basics 1297 ...
Страница 1711: ...Vl 200 Dell Policy based Routing PBR 1711 ...
Страница 2277: ...Example Dell show run vrf test3 ip vrf test3 description IT Department Virtual Routing and Forwarding VRF 2277 ...