Icmp Vulnerabilities - Dell S6100 Configuration Manual

Hide thumbs Also See for S6100:
Table of Contents

Advertisement

Version
9.8(1.0)
9.8(0.0P5)
9.8(0.0P2)
9.7(0.0)
9.5(0.1)
9.5(0.0)
Usage Information
Instead of using the system defined user roles, you can create a new user role that best matches your organization.
When you create a new user role, you first inherit permissions from one of the system defined roles. Otherwise you
would have to create a user role from scratch. You then restrict commands or add commands to that role. For
information about this topic, See Modifying Command Permissions for Roles.
Important Points to Remember
Consider the following when creating a user role:
role mode { { { addrole | deleterole } role-name } | reset } command – Modifies (adds
or deletes) command permissions for newly created user roles and system defined roles.
Related Commands

ICMP Vulnerabilities

The internet control message protocol (ICMP) is a network-layer internet protocol that provides message packets to report errors and
other information regarding IP packet processing back to the source. Dell Networking OS mainly addresses the following ICMP
vulnerabilities:
ICMP Mask Reply
ICMP Timestamp Request
ICMP Replies
IP ID Values Randomness
1472
Security
Description
Introduced on the Z9100-ON.
Introduced on the S4048-ON.
Introduced on the S3048-ON.
Introduced on the S6000-ON.
Introduced on the Z9500.
Introduced on the Z9000, S6000, S4820T, S4810, MXL.
NOTE:
You can change user role permissions on system pre-defined user roles or user-defined user
roles.
Only the system administrator and user-defined roles inherited from the system administrator can create roles
and usernames. Only the system administrator, security administrator, and roles inherited from these can use
the role command to modify command permissions. The security administrator and roles inherited by security
administrator can only modify permissions for commands they already have access to.
Make sure you select the correct role you want to inherit.
NOTE:
If you inherit a user role, you cannot modify or delete the inheritance. If you want to change or
remove the inheritance, delete the user role and create it again. If the user role is in use, you cannot
delete the user role.
role mode { { { addrole | deleterole } role-name } | reset } command — modifies (adds or deletes) command
permissions for newly created user roles and system defined roles.

Advertisement

Table of Contents
loading

Table of Contents