Setup Guide

Table Of Contents
Only the system administrator and user-defined roles inherited from the system administrator can
create roles and usernames. Only the system administrator, security administrator, and roles inherited
from these can use the role command to modify command permissions. The security administrator
and roles inherited by security administrator can only modify permissions for commands they already
have access to.
Make sure you select the correct role you want to inherit.
NOTE: If you inherit a user role, you cannot modify or delete the inheritance. If you want to change
or remove the inheritance, delete the user role and create it again. If the user role is in use, you
cannot delete the user role.
role mode { { { addrole | deleterole } role-name } | reset } command Modifies
(adds or deletes) command permissions for newly created user roles and system defined roles.
Related
Commands
role mode { { { addrole | deleterole } role-name } | reset } command modifies (adds or deletes)
command permissions for newly created user roles and system defined roles.
ICMP Vulnerabilities
The internet control message protocol (ICMP) is a network-layer internet protocol that provides message packets to report
errors and other information regarding IP packet processing back to the source. Dell EMC Networking OS mainly addresses the
following ICMP vulnerabilities:
ICMP Mask Reply
ICMP Timestamp Request
ICMP Replies
IP ID Values Randomness
You can configure the Dell EMC Networking OS to drop ICMP reply messages. When you configure the drop icmp command,
the system drops the ICMP reply messages from the front end and management interfaces. By default, the Dell EMC
Networking OS responds to all the ICMP messages. You can configure the Dell EMC Networking OS to suppress the following
ICMPv4 and ICMPv6 message types:
Table 7. Suppressed ICMPv4 message types
ICMPv4 Message Types
Echo reply (0)
All sub types of destination unreachable (3)
Source quench (4)
Redirect (5)
Router advertisement (9)
Router solicitation (10)
Time exceeded (11)
IP header bad (12)
Timestamp request (13)
Timestamp reply (14)
Information request (15)
Information reply (16)
Address mask request (17)
Address mask reply (18)
NOTE: The Dell EMC Networking OS does not suppress the ICMPv4 message type Echo request (8).
1418 Security