White Papers

Table Of Contents
Version Description
9.12(1.0) Introduced on the S5048FON.
9.10(0.1) Introduced on the S6010-ON and S4048T-ON.
9.10(0.0) Introduced on the S3148.
9.10(0.0) Introduced on the S6100-ON.
9.8(2.0) Introduced on the S3100 series.
9.8(1.0) Introduced on the Z9100-ON.
9.8(0.0P5) Introduced on the S4048-ON.
9.8(0.0P2) Introduced on the S3048-ON.
9.7(0.0) Introduced on the S6000-ON.
9.5(0.1) Introduced on the Z9500.
9.5(0.0) Introduced on the Z9000, S6000, S4820T, S4810, MXL.
Usage
Information
Instead of using the system defined user roles, you can create a new user role that best matches your
organization. When you create a new user role, you first inherit permissions from one of the system
defined roles. Otherwise you would have to create a user role from scratch. You then restrict commands
or add commands to that role. For information about this topic, See Modifying Command Permissions for
Roles.
NOTE: You can change user role permissions on system pre-defined user roles or user-defined user
roles.
Important Points to Remember
Consider the following when creating a user role:
Only the system administrator and user-defined roles inherited from the system administrator can
create roles and usernames. Only the system administrator, security administrator, and roles inherited
from these can use the role command to modify command permissions. The security administrator
and roles inherited by security administrator can only modify permissions for commands they already
have access to.
Make sure you select the correct role you want to inherit.
NOTE: If you inherit a user role, you cannot modify or delete the inheritance. If you want to change
or remove the inheritance, delete the user role and create it again. If the user role is in use, you
cannot delete the user role.
role mode { { { addrole | deleterole } role-name } | reset } command Modifies
(adds or deletes) command permissions for newly created user roles and system defined roles.
Related
Commands
role mode { { { addrole | deleterole } role-name } | reset } command modifies (adds or deletes)
command permissions for newly created user roles and system defined roles.
ICMP Vulnerabilities
The internet control message protocol (ICMP) is a network-layer internet protocol that provides message packets to report
errors and other information regarding IP packet processing back to the source. Dell EMC Networking OS mainly addresses the
following ICMP vulnerabilities:
ICMP Mask Reply
ICMP Timestamp Request
ICMP Replies
IP ID Values Randomness
You can configure the Dell EMC Networking OS to drop ICMP reply messages. When you configure the drop icmp command,
the system drops the ICMP reply messages from the front end and management interfaces. By default, the Dell EMC
1438
Security