536 | Securityw w w . d e l l . c o m | s u p p o r t . d e l l . c o maaa authorization execSet parameters that restrict (or permit) a user’s access to EXEC-level commands.Syntax aaa authorization exec {name | default} {local || tacacs+ || if-authenticated || none}To disable authorization checking for EXEC level commands, use the no aaa authorization execcommand.ParametersDefaults noneCommand Modes CONFIGURATIONCommandHistoryprivilege level (CONFIGURATION mode)Change the access or privilege level of one or more commands.Syntax privilege mode {level level command | reset command}To delete access to a level and command, use the no privilege mode level level command command.ParametersDefaults Not configured.Command Modes CONFIGURATIONname Define a name for the list of authorization methods.default Define the default list of authorization methods.local Use the authorization parameters on the system to perform authorization.tacacs+ Use the TACACS+ protocol to perform authorization.none Enter this keyword to apply no authorization.Version 8.3.16.1 Introduced on MXL 10/40GbE Switch IO Modulemode Enter one of the following keywords as the mode for which you are controlling access:• configure for the CONFIGURATION mode• exec for the EXEC mode• interface for the INTERFACE modes• line for the LINE mode• route-map for the ROUTE-MAP• router for the ROUTER OSPF, ROUTER RIP, and ROUTER BGP modes.level level Enter the keyword level followed by a number for the access level.Range: 0 to 15.Level 1 is the EXEC mode and Level 15 allows access to all CLI modes and commands.reset Enter the keyword reset to return the security level to the default setting.command Enter the command’s keywords to assign the command to a certain access level. You canenter one or all of the keywords