
Security
This chapter contains various types of security commands offered in the Dell Networking operating software.
The commands are listed in the following sections:
•
•
Authorization and Privilege Commands
•
•
Authentication and Password Commands
•
•
•
Port Authentication (802.1X) Commands
•
•
For configuration details, refer to the Security chapter in the
Dell Networking OS Configuration Guide
.
NOTE:
Starting with the Dell Networking OS version 7.2.1.0, LEAP with MSCHAP v2 supplicant is
implemented.
Topics:
•
Role-Based Access Control Commands
•
•
Authorization and Privilege Commands
•
Authentication and Password Commands
•
•
•
Port Authentication (802.1X) Commands
•
•
Role-Based Access Control Commands
With Role-Based Access Control (RBAC), access and authorization is controlled based on a user’s role. Users
are granted permissions based on their user roles, not on their individual user ID. User roles are created for
job functions and through those roles they acquire the permissions to perform their associated job function.
This section describes the syntax and usage of RBAC-specific commands. You can find information on other
related security commands in this chapter:
51
Security
1913
Содержание C9000 series
Страница 1: ...Dell Networking Command Line Reference Guide for the C9000 Series Version 9 10 0 0 ...
Страница 394: ...deny 14551 666 Dell Access Control Lists ACL 394 ...
Страница 877: ...algorithm FIPS Cryptography 877 ...
Страница 1297: ...Total 5 0 Total 5 active route s using 952 bytes IPv6 Basics 1297 ...
Страница 1711: ...Vl 200 Dell Policy based Routing PBR 1711 ...
Страница 2277: ...Example Dell show run vrf test3 ip vrf test3 description IT Department Virtual Routing and Forwarding VRF 2277 ...