47
Security
This chapter contains various types of security commands offered in the Dell Networking operating
software.
The commands are listed in the following sections:
• AAA Accounting Commands
• Authorization and Privilege Commands
• Obscure Password Command
• Authentication and Password Commands
• RADIUS Commands
• TACACS+ Commands
• Port Authentication (802.1X) Commands
• SSH Server and SCP Commands
• Secure DHCP Commands
For configuration details, refer to the Security chapter in the Dell Networking OS Configuration Guide.
NOTE: Starting with the Dell Networking OS version 7.2.1.0, LEAP with MSCHAP v2 supplicant is
implemented.
Role-Based Access Control Commands
With Role-Based Access Control (RBAC), access and authorization is controlled based on a user’s role.
Users are granted permissions based on their user roles, not on their individual user ID. User roles are
created for job functions and through those roles they acquire the permissions to perform their
associated job function.
This section describes the syntax and usage of RBAC-specific commands. You can find information on
other related security commands in this chapter:
• aaa accounting
• aaa authentication login
• aaa authorization commands
• authorization
• show accounting
• show users
• username
1592
Security