You must specify at least local authentication. For consistency, the best practice is to define the same authentication method list
across all lines, in the same order of comparison; for example VTY and console port.
You could also use the default authentication method to apply to all the LINES; for example, console port and VTY.
NOTE:
The authentication method list must be in the same order as the authorization method list. For example, if you
configure the authentication method list in the following order—, local—Dell Networking recommends
configuring the authorization method list in the same order—, local.
4
Specify the authorization method list—RADIUS, , or Local. At a minimum, you must specify local authorization.
For consistency, the best practice is to define the same authorization method list across all lines, in the same order of comparison; for
example, VTY and console port.
You could also use the default authorization method list to apply to all the LINES—console port, VTY.
If you do not, the following error displays when you attempt to enable role-based only AAA authorization:
% Error: Exec authorization must be applied to more than one line to be useful, e.g. console
and vty lines. Could use default authorization method list as alternative.
5
Verify the configuration is applied to the console or VTY line.
Dell (conf)#do show running-config line
!
line console 0
login authentication test
authorization exec test
exec-timeout 0 0
line vty 0
login authentication test
authorization exec test
line vty 1
login authentication test
authorization exec test
To enable role-based only AAA authorization, enter the following command in Configuration mode:
Dell(conf)#aaa authorization role-only
System-Defined RBAC User Roles
By default, the Dell Networking OS provides 4 system defined user roles. You can create up to 8 additional user roles.
NOTE:
You cannot delete any system defined roles.
The system defined user roles are as follows:
•
Network Operator (netoperator) - This user role has no privilege to modify any configuration on the switch. You can access Exec mode
(monitoring) to view the current configuration and status information.
•
Network Administrator (netadmin): This user role can configure, display, and debug the network operations on the switch. You can
access all of the commands that are available from the network operator user role. This role does not have access to the commands
that are available to the system security administrator for cryptography operations, AAA, or the commands reserved solely for the
system administrator.
•
Security Administrator (secadmin): This user role can control the security policy across the systems that are within a domain or network
topology. The security administrator commands include FIPS mode enablement, password policies, inactivity timeouts, banner
establishment, and cryptographic key operations for secure access paths.
•
System Administrator (sysadmin). This role has full access to all the commands in the system, exclusive access to commands that
manipulate the file system formatting, and access to the system shell. This role can also create user IDs and user roles.
The following summarizes the modes that the predefined user roles can access.
Role Modes
Security
727
Содержание S3048-ON
Страница 1: ...Dell Configuration Guide for the S3048 ON System 9 11 2 5 ...
Страница 137: ...0 Gi 1 1 Gi 1 2 rx Flow N A N A 0 0 No N A N A yes Access Control Lists ACLs 137 ...
Страница 142: ...Figure 10 BFD Three Way Handshake State Changes 142 Bidirectional Forwarding Detection BFD ...
Страница 241: ...Dell Control Plane Policing CoPP 241 ...
Страница 287: ... RPM Synchronization GARP VLAN Registration Protocol GVRP 287 ...
Страница 428: ...Figure 53 Inspecting the LAG Configuration 428 Link Aggregation Control Protocol LACP ...
Страница 429: ...Figure 54 Inspecting Configuration of LAG 10 on ALPHA Link Aggregation Control Protocol LACP 429 ...
Страница 432: ...Figure 56 Inspecting a LAG Port on BRAVO Using the show interface Command 432 Link Aggregation Control Protocol LACP ...
Страница 433: ...Figure 57 Inspecting LAG 10 Using the show interfaces port channel Command Link Aggregation Control Protocol LACP 433 ...
Страница 477: ...Figure 73 Configuring Interfaces for MSDP Multicast Source Discovery Protocol MSDP 477 ...
Страница 478: ...Figure 74 Configuring OSPF and BGP for MSDP 478 Multicast Source Discovery Protocol MSDP ...
Страница 479: ...Figure 75 Configuring PIM in Multiple Routing Domains Multicast Source Discovery Protocol MSDP 479 ...
Страница 483: ...Figure 77 MSDP Default Peer Scenario 2 Multicast Source Discovery Protocol MSDP 483 ...
Страница 484: ...Figure 78 MSDP Default Peer Scenario 3 484 Multicast Source Discovery Protocol MSDP ...
Страница 634: ...protocol spanning tree pvst no disable vlan 300 bridge priority 4096 634 Per VLAN Spanning Tree Plus PVST ...
Страница 745: ...Figure 104 Single and Double Tag TPID Match Service Provider Bridging 745 ...
Страница 746: ...Figure 105 Single and Double Tag First byte TPID Match 746 Service Provider Bridging ...