Administrator Guide
Security
This chapter contains various types of security commands offered in the Dell Networking operating software.
The commands are listed in the following sections:
● AAA Accounting Commands
● Authorization and Privilege Commands
● Obscure Password Command
● Authentication and Password Commands
● RADIUS Commands
● TACACS+ Commands
● Port Authentication (802.1X) Commands
● SSH Server and SCP Commands
● Secure DHCP Commands
For configuration details, refer to the Security chapter in the Dell Networking OS Configuration Guide.
NOTE: Starting with the Dell Networking OS version 7.2.1.0, LEAP with MSCHAP v2 supplicant is implemented.
Topics:
• Role-Based Access Control Commands
• AAA Accounting Commands
• Authorization and Privilege Commands
• Authentication and Password Commands
• RADIUS Commands
• TACACS+ Commands
• Port Authentication (802.1X) Commands
• SSH Server and SCP Commands
• Secure DHCP Commands
• ICMP Vulnerabilities
• System Security Commands
Role-Based Access Control Commands
With Role-Based Access Control (RBAC), access and authorization is controlled based on a user’s role. Users are granted
permissions based on their user roles, not on their individual user ID. User roles are created for job functions and through those
roles they acquire the permissions to perform their associated job function.
This section describes the syntax and usage of RBAC-specific commands. You can find information on other related security
commands in this chapter:
● aaa accounting
● aaa authentication login
● aaa authorization commands
● authorization
● show accounting
● show users
● username
53
Security 1503