Deployment Guide

Table Of Contents
Obscuring Passwords and Keys
By default, the service password-encryption command stores encrypted passwords. For greater security, you can also
use the service obscure-passwords command to prevent a user from reading the passwords and keys, including RADIUS,
TACACS+ keys, router authentication strings, VRRP authentication by obscuring this information. Passwords and keys are
stored encrypted in the configuration file and by default are displayed in the encrypted form when the configuration is displayed.
Enabling the service obscure-passwords command displays asterisks instead of the encrypted passwords and keys. This
command prevents a user from reading these passwords and keys by obscuring this information with asterisks.
Password obscuring masks the password and keys for display only but does not change the contents of the file. The string of
asterisks is the same length as the encrypted string for that line of configuration. To verify that you have successfully obscured
passwords and keys, use the show running-config command or show startup-config command.
If you are using role-based access control (RBAC), only the system administrator and security administrator roles can enable
the service obscure-password command.
To enable the obscuring of passwords and keys, use the following command.
Turn on the obscuring of passwords and keys in the configuration.
CONFIGURATION mode
service obscure-passwords
Example of Obscuring Password and Keys
Dell(config)# service obscure-passwords
Configuring Custom Privilege Levels
In addition to assigning privilege levels to the user, you can configure the privilege levels of commands so that they are visible in
different privilege levels.
Within the Dell Networking OS, commands have certain privilege levels. With the privilege command, you can change the
default level or you can reset their privilege level back to the default.
Assign the launch keyword (for example, configure) for the keywords command mode.
If you assign only the first keyword to the privilege level, all commands beginning with that keyword are also assigned to the
privilege level. If you enter the entire command, the software assigns the privilege level to that command only.
To assign commands and passwords to a custom privilege level, use the following commands. You must be in privilege level 15.
1. Assign a user name and password.
CONFIGURATION mode
username name [access-class access-list-name] [privilege level] [nopassword | password
[encryption-type] password]
Configure the optional and required parameters:
name: enter a text string (up to 63 characters).
access-class access-list-name: enter the name of a configured IP ACL.
privilege level: the range is from 0 to 15.
nopassword: do not require the user to enter a password.
encryption-type: enter 0 for plain text or 7 for encrypted text.
password: enter a string.
2. Configure a password for privilege level.
CONFIGURATION mode
enable password [level level] [encryption-mode] password
Configure the optional and required parameters:
level level: specify a level from 0 to 15. Level 15 includes all levels.
encryption-type: enter 0 for plain text or 7 for encrypted text.
password: enter a string up to 25 characters long.
To change only the password for the enable command, configure only the password parameter.
3. Configure level and commands for a mode or reset a commands level.
Security
845