EasyManuals Logo

Dell S4048T User Manual

Dell S4048T
1277 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #923 background imageLoading...
Page #923 background image
To view the TACACS+ configuration, use the show running-config tacacs+ command in EXEC Privilege
mode.
To delete a TACACS+ server host, use the no tacacs-server host {hostname | ip-address}
command.
freebsd2# telnet 2200:2200:2200:2200:2200::2202
Trying 2200:2200:2200:2200:2200::2202...
Connected to 2200:2200:2200:2200:2200::2202.
Escape character is '^]'.
Login: admin
Password:
Dell#
Dell#
Command Authorization
The AAA command authorization feature configures Dell Networking OS to send each configuration
command to a TACACS server for authorization before it is added to the running configuration.
By default, the AAA authorization commands configure the system to check both EXEC mode and
CONFIGURATION mode commands. Use the no aaa authorization config-commands command to
enable only EXEC mode command checking.
If rejected by the AAA server, the command is not added to the running config, and a message displays:
04:07:48: %RPM0-P:CP %SEC-3-SEC_AUTHORIZATION_FAIL: Authorization failure Command
authorization failed for user (denyall) on vty0 ( 10.11.9.209 )
Certain TACACS+ servers do not authenticate the device if you use the aaa authorization commands
level default local tacacs+ command. To resolve the issue, use the aaa authorization
commands level default tacacs+ local command.
Protection from TCP Tiny and
Overlapping Fragment Attacks
Tiny and overlapping fragment attack is a class of attack where configured ACL entries — denying TCP port-
specific traffic — is bypassed and traffic is sent to its destination although denied by the ACL.
RFC 1858 and 3128 proposes a countermeasure to the problem. This countermeasure is configured into the
line cards and enabled by default.
Enabling SCP and SSH
Secure shell (SSH) is a protocol for secure remote login and other secure network services over an insecure
network. Dell Networking OS is compatible with SSH versions 1.5 and 2, in both the client and server modes.
SSH sessions are encrypted and use authentication. SSH is enabled by default.
For details about the command syntax, refer to the Security chapter in the Dell Networking OS Command
Line Interface Reference Guide
.
Security 923

Table of Contents

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Dell S4048T and is the answer not in the manual?

Dell S4048T Specifications

General IconGeneral
Switching Capacity1.44 Tbps
Rack Units1U
Form FactorRack-mountable
Power DeviceInternal power supply
Power RedundancyOptional
Product TypeSwitch
Jumbo Frame SupportYes
Routing ProtocolOSPF, BGP, RIP, VRRP, PIM-SM, IGMP
Remote Management ProtocolSNMP, RMON, Telnet, SSH
FeaturesQuality of Service (QoS), Jumbo Frames Support, Virtual Route Redundancy Protocol (VRRP), VLAN support, sFlow, Multiple Spanning Tree Protocol (MSTP), Rapid Spanning Tree Protocol (RSTP), IPv6 support
Compliant StandardsIEEE 802.3, IEEE 802.3u, IEEE 802.3ab, IEEE 802.3ae
Dimensions (W x D x H)17.3 in x 16 in x 1.7 in
Operating Temperature0°C to 40 °C
Operating Humidity10% to 90% (non-condensing)

Related product manuals