Setup Guide
NOTE:
dynamic-salt option is shown only with secret and password options.
In dynamic-salt conguration, the length of type 5 secret and type 7 password is 32 and 16 characters more compared to the
secret and password length without dynamic-salt conguration. An error message appears if the
username command reaches the
maximum length, which is 256 characters.
The dynamic-salt support for the user conguration is added in REST API. For more information on REST support, see Dell EMC
Networking Open Automation guide
.
Conguring the Enable Password
Access EXEC Privilege mode using the enable command. EXEC Privilege mode is unrestricted by default. Congure a password as a
basic security measure.
There are three types of enable passwords:
• enable password is stored in the running/startup conguration using a DES encryption method.
• enable secret is stored in the running/startup conguration using MD5 encryption method.
• enable sha256-password is stored in the running/startup conguration using sha256-based encryption method (PBKDF2).
Dell EMC Networking recommends using the enable sha256-password password.
To congure an enable password, use the following command.
• Create a password to access EXEC Privilege mode.
CONFIGURATION mode
enable [password | secret | sha256-password] [level level] [encryption-type] password
– level: is the privilege level, is 15 by default, and is not required.
– encryption-type: species how you input the password, is 0 by default, and is not required.
◦ 0 is to input the password in clear text.
◦ 5 is to input a password that is already encrypted using MD5 encryption method. Obtain the encrypted password from the
conguration le of another device.
◦ 7 is to input a password that is already encrypted using DES encryption method. Obtain the encrypted password from the
conguration le of another device.
◦ 8 is to input a password that is already encrypted using sha256-based encryption method. Obtain the encrypted password from
the conguration le of another device.
Conguration File Management
Files can be stored on and accessed from various storage media. Rename, delete, and copy les on the system from EXEC Privilege mode.
Copy Files to and from the System
The command syntax for copying les is similar to UNIX. The copy command uses the format copy source-file-url
destination-file-url
.
NOTE
: For a detailed description of the copy command, refer to the
Dell EMC Networking OS Command Reference
.
• To copy a local le to a remote system, combine the le-origin syntax for a local le location with the le-destination syntax for a remote
le location.
54
Getting Started










