Connectivity Guide

Table Of Contents
name inherit — Enter the name of the TACACS+ user role that inherits permissions from an OS10 user
role; 32 characters maximum.
existing-role-name — Assign the permissions associated with an OS10 user role:
sysadmin — Full access to all commands in the system, exclusive access to commands that manipulate
the le system, and access to the system shell. A system administrator can create user IDs and user roles.
secadmin — Full access to conguration commands that set security policy and system access, such as
password strength, AAA authorization, and cryptographic keys. A security administrator can display security
information, such as cryptographic keys, login statistics, and log information.
netadmin — Full access to conguration commands that manage trac owing through the switch,
such as routes, interfaces, and ACLs. A network administrator cannot access conguration commands for
security features or view security information.
netoperator — Access only to EXEC mode to view the current conguration. A network operator
cannot modify any conguration setting on a switch.
Default OS10 assigns the netoperator role to a user authenticated by a TACACS+ server with a missing or unknown
role.
Command Mode CONFIGURATION
Usage Information
When a TACACS+ server authenticates a user and does not return a role or returns an unknown role, OS10
assigns the netoperator role to the user by default. Use this command to recongure the default
netoperator permissions.
To assign OS10 user role permissions to a specied TACACS+ user role, enter a value for name inherit. The
no userrole default version of the command resets the role to netoperator.
Example
OS10(config)# userrole default inherit sysadmin
Supported Releases 10.4.0E(R3P3) or later
Simple Network Management Protocol
Network management stations use simple network management protocol (SNMP) to retrieve and modify software congurations for
managed objects on an agent in network devices. A managed object is a datum of management information.
The SNMP agent in a managed device maintains the data for managed objects in management information bases (MIBs). Managed objects
are identied by their object identiers (OIDs). A remote SNMP agent performs an SNMP walk on the OIDs stored in MIBs on the local
switch to view and retrieve information.
OS10 supports standard and private SNMP MIBs, including all get requests. MIBs are hierarchically structured and use object identiers to
access managed objects. For a list of MIBs supported in the OS10 version running on a switch, refer to the OS10 Release Notes for the
release.
NOTE
: OS10 supports SNMP set operations only on SysName in System MIBs.
OS10 supports dierent security models and levels in SNMP communication between SNMP managers and agents. Each security model
refers to an SNMP version used in SNMP messages. SNMP versions provide dierent levels of security, such as user authentication and
message encryption.
SNMP security models and levels
OS10 supports SNMP security models v1, v2c, and v3. The supported security levels are no authentication, authentication, and privacy.
System management
639