Users Guide
netadmin Exec Config Interface Line Router IP Routemap Protocol MAC
secadmin Exec Config
sysadmin Exec Config Interface Line Router IP Routemap Protocol MAC
testadmin netadmin Exec Config Interface Line Router IP Routemap Protocol MAC
Displaying Role Permissions Assigned to a Command
To display permissions assigned to a command, use the show role command in EXEC Privilege mode. The output displays the user role
and or permission level.
Example of Role Permissions Assigned to a Command
DellEMC#show role mode ?
configure Global configuration mode
exec Exec Mode
interface Interface configuration mode
line Line Configuration mode
route-map Route map configuration mode
router Router configuration mode
DellEMC#show role mode configure username
Role access: sysadmin
DellEMC##show role mode configure password-attributes
Role access: secadmin,sysadmin
DellEMC#show role mode configure interface
Role access: netadmin, sysadmin
DellEMC#show role mode configure line
Role access: netadmin,sysadmin
Displaying Information About Users Logged into the Switch
To display information on all users logged into the switch, using the show users command in EXEC Privilege mode. The output displays
privilege level and/or user role. The mode is displayed at the start of the output and both the privilege and roles for all users is also
displayed. If the role is not dened, the system displays "unassigned" .
Example of Displaying Information About Users Logged into the Switch
DellEMC#show users
Authorization Mode: role or privilege
Line User Role Privilege Host(s) Location
0 console 0 admin sysadmin 15 idle
*3 vty 1 sec1 secadmin 14 idle 172.31.1.4
4 vty 2 ml1 netadmin 12 idle 172.31.1.5
Dell EMC Networking OS Security Hardening
The security of a network consists of multiple factors. Apart from access to the device, best practices, and implementing various security
features, security also lies with the integrity of the device. If the software itself is compromised, all of the aforementioned methods become
ineective.
The Dell EMC Networking OS is enhanced verify whether the OS image and the startup conguration le are altered before loading. This
section explains how to congure OS image and startup conguration verication.
752
Security