Users Guide

Table Of Contents
sha-256 — Encrypt the password using the SHA-256 algorithm.
sha-512 — Encrypt the password using the SHA-512 algorithm.
priv-lvl privilege-level — Enter a privilege level, from 1 to 15.
OS10(config)# privilege exec priv-lvl 3 "show version"
OS10(config)# enable password 0 P@$$w0Rd priv-lvl 3
OS10(config)# privilege exec priv-lvl 12 "configure terminal"
OS10(config)# privilege configure priv-lvl 12 route-map
OS10(config)# privilege route-map priv-lvl 12 "set local-preference"
OS10(config)# enable password sha-256 $5$2uThib1o$84p.tykjmz/w7j26ymoKBjrb7uepkUB priv-lvl 12
Audit log
To monitor user activity and configuration changes on the switch, enable the audit log. Only the sysadmin and secadmin roles can
enable, view, and clear the audit log.
The audit log records configuration and security events, including:
User logins and logouts on the switch, failed logins, and concurrent login attempts by a user
User-based configuration changes recorded with the user ID, date, and time of the change. The specific parameter changes are not
logged.
Establishment of secure traffic flows, such as SSH, and violations on secure flows
Certificate issues, including user access and changes made to certificate installation using crypto commands
Adding and deleting users
Audit log entries are saved locally and sent to configured Syslog servers. To set up a Syslog server, see System logging.
Enable audit log
Enable configuration and security event recording in the audit log on Syslog servers in CONFIGURATION mode.
logging audit enable
To disable audit logging, use the no logging audit enable command.
View audit log
Display audit log entries in EXEC mode. By default, 24 entries are displayed, starting with the oldest event. Enter reverse to display
entries starting with the most recent events. You can change the number of entries that display.
show logging audit [reverse] [number]
Clear audit log
Clear all events in the audit log in CONFIGURATION mode.
clear logging audit
Example
OS10(config)# logging audit enable
OS10(config)# exit
OS10# show logging audit 4
<14>1 2019-02-14T13:15:06.283337+00:00 OS10 audispd - - - Node.1-Unit.1:PRI [audit], Dell EMC
(OS10) node=OS10 type=USER_END msg=audit(1550150106.277:597): pid=7908 uid=0 auid=4294967295
ses=4294967295 msg='op=PAM:session_close acct="admin" exe="/bin/su" hostname=? addr=?
terminal=??? res=success'
<110>1 2019-02-14T13:15:16.331515+00:00 OS10 .clish 7412 - - Node.1-Unit.1:PRI [audit], User
admin on console used cmd: 'crypto security-profile mltestprofile' - success
<110>1 2019-02-14T13:15:21.794529+00:00 OS10 .clish 7412 - - Node.1-Unit.1:PRI [audit], User
admin on console used cmd: 'exit' - success
<110>1 2019-02-14T13:16:05.882555+00:00 OS10 .clish 7412 - - Node.1-Unit.1:PRI [audit], User
admin on console used cmd: 'exit' - success
OS10# show logging audit reverse 4
<110>1 2019-02-14T13:16:05.882555+00:00 OS10 .clish 7412 - - Node.1-Unit.1:PRI [audit], User
936
Security