White Papers

Table Of Contents
sysadmin Exec Config Interface Line Router IP Routemap Protocol MAC
testadmin netadmin Exec Config Interface Line Router IP Routemap Protocol MAC
Displaying Role Permissions Assigned to a Command
To display permissions assigned to a command, use the show role command in EXEC Privilege mode. The output displays the
user role and or permission level.
Example of Role Permissions Assigned to a Command
DellEMC#show role mode ?
configure Global configuration mode
exec Exec Mode
interface Interface configuration mode
line Line Configuration mode
route-map Route map configuration mode
router Router configuration mode
DellEMC#show role mode configure username
Role access: sysadmin
DellEMC##show role mode configure password-attributes
Role access: secadmin,sysadmin
DellEMC#show role mode configure interface
Role access: netadmin, sysadmin
DellEMC#show role mode configure line
Role access: netadmin,sysadmin
Displaying Information About Users Logged into the Switch
To display information on all users logged into the switch, using the show users command in EXEC Privilege mode. The
output displays privilege level and/or user role. The mode is displayed at the start of the output and both the privilege and roles
for all users is also displayed. If the role is not defined, the system displays "unassigned" .
Example of Displaying Information About Users Logged into the Switch
DellEMC#show users
Authorization Mode: role or privilege
Line User Role Privilege Host(s) Location
0 console 0 admin sysadmin 15 idle
*3 vty 1 sec1 secadmin 14 idle 172.31.1.4
4 vty 2 ml1 netadmin 12 idle 172.31.1.5
Dell EMC Networking OS Security Hardening
The security of a network consists of multiple factors. Apart from access to the device, best practices, and implementing
various security features, security also lies with the integrity of the device. If the software itself is compromised, all of the
aforementioned methods become ineffective.
The Dell EMC Networking OS is enhanced verify whether the OS image and the startup configuration file are altered before
loading. This section explains how to configure OS image and startup configuration verification.
Dell EMC Networking OS Image Verification
Dell EMC Networking OS comes with the OS image verification and the startup configuration verification features. When
enabled, these features check the integrity of The OS image and the startup configuration that the system uses while the
system reboots and loads only if they are intact.
700
Security