43
Security
Security features are supported on Dell Networking OS.
This chapter describes several ways to provide security to the Dell Networking system.
For details about all the commands described in this chapter, refer to the
Security
chapter in the
Dell
Networking OS Command Reference Guide
.
AAA Accounting
Accounting, authentication, and authorization (AAA) accounting is part of the AAA security model.
For details about commands related to AAA security, refer to the
Security
chapter in the
Dell Networking
OS Command Reference Guide
.
AAA accounting enables tracking of services that users are accessing and the amount of network
resources being consumed by those services. When you enable AAA accounting, the network server
reports user activity to the security server in the form of accounting records. Each accounting record
comprises accounting attribute/value (AV) pairs and is stored on the access control server.
As with authentication and authorization, you must configure AAA accounting by defining a named list of
accounting methods and then applying that list to various virtual terminal line (VTY) lines.
Configuration Task List for AAA Accounting
The following sections present the AAA accounting configuration tasks.
•
(mandatory)
•
Suppressing AAA Accounting for Null Username Sessions
•
Configuring Accounting of EXEC and Privilege-Level Command Usage
(optional)
•
Configuring AAA Accounting for Terminal Lines
•
(optional)
Enabling AAA Accounting
The
aaa accounting
command allows you to create a record for any or all of the accounting functions
monitored.
To enable AAA accounting, use the following command.
• Enable AAA accounting and create a record for monitoring the accounting function.
CONFIGURATION mode
aaa accounting {commands | exec | suppress | system
level
} {
default
|
name
}
{start-stop | wait-start | stop-only} {}
The variables are:
Security
713
Summary of Contents for Z9000
Page 1: ...Dell Configuration Guide for the Z9000 System 9 7 0 0 ...
Page 80: ...grub reboot 80 Management ...
Page 128: ... 0 Te 1 1 Te 1 2 rx Flow N A N A 128 Access Control Lists ACLs ...
Page 491: ...Figure 70 Configuring OSPF and BGP for MSDP Multicast Source Discovery Protocol MSDP 491 ...
Page 496: ...Figure 73 MSDP Default Peer Scenario 1 496 Multicast Source Discovery Protocol MSDP ...
Page 497: ...Figure 74 MSDP Default Peer Scenario 2 Multicast Source Discovery Protocol MSDP 497 ...
Page 498: ...Figure 75 MSDP Default Peer Scenario 3 498 Multicast Source Discovery Protocol MSDP ...
Page 760: ...Figure 100 Single and Double Tag TPID Match 760 Service Provider Bridging ...
Page 761: ...Figure 101 Single and Double Tag First byte TPID Match Service Provider Bridging 761 ...