Lenovo RD220 User Guide - Page 44

Service Location Protocol (SLP), Configuring security, Ability to Clear Event Logs bit position 9

Page 44 highlights

v Ability to Clear Event Logs (bit position 9): If this bit is set, the user can clear the event logs. All users can view the event logs, but this particular permission is required to clear the logs. v Advanced Adapter Configuration (bit position 10): If this bit is set, the user has no restrictions when configuring the IMM. In addition, the user is said to have administrative access to the IMM, meaning that the user can also perform the following advanced functions: firmware upgrades, PXE network boot, restoring IMM factory defaults, modifying and restoring IMM configuration from a configuration file, and restarting and resetting the IMM. v Reserved (bit position 11): This bit is reserved for future use. If none of the bits are set, the user has read-only authority. Priority is given to login permissions that are retrieved directly from the user record. If the login permission attribute is not in the user's record, an attempt is made to retrieve the permissions from the groups to which the user belongs. This is done as part of the group authentication phase. The user is assigned the inclusive OR of all the bits for all of the groups. The Read Only bit is set only if all the other bits are zero. If the Deny Always bit is set for any of the groups, the user is refused access. The Deny Always bit always has precedence over every other bit. Important: If you give a user the ability to modify basic, networking, and security-related IMM configuration parameters, consider giving this same user the ability to restart the IMM (bit position 10). Otherwise, a user might be able to change parameters (for example, the IP address of the IMM) but cannot make them take effect. Service Location Protocol (SLP) To view the SLP setting, complete the following steps: 1. In the navigation pane, click Network protocols. 2. Scroll down to the Service Location Protocol (SLP) area. The multicast address, which is the IP address that the IMM SLP server listens on, is displayed. Configuring security | Use the general procedure in this section to configure security for the IMM Web | server, for the connection between the IMM and an LDAP server. If you are not | familiar with the use of SSL certificates, read the information in "SSL certificate | overview" on page 39. Use the following general tasks list to configure the security for the IMM: 1. Configure the Secure Web server: a. Disable the SSL server. Use the HTTPS Server Configuration for Web Server area on the Security page. b. Generate or import a certificate. Use the HTTPS Server Certificate Management area on the Security page (see "SSL server certificate management" on page 40). c. Enable the SSL server. Use the HTTPS Server Configuration for Web Server area on the Security page (see "Enabling SSL for the secure Web server" on page 43). 2. Configure SSL security for LDAP connections: 38 Integrated Management Module: User Guide

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120

v
Ability to Clear Event Logs (bit position 9):
If this bit is set, the user
can clear the event logs. All users can view the event logs, but this
particular permission is required to clear the logs.
v
Advanced Adapter Configuration (bit position 10):
If this bit is set, the
user has no restrictions when configuring the IMM. In addition, the user
is said to have administrative access to the IMM, meaning that the user
can also perform the following advanced functions: firmware upgrades,
PXE network boot, restoring IMM factory defaults, modifying and
restoring IMM configuration from a configuration file, and restarting and
resetting the IMM.
v
Reserved (bit position 11):
This bit is reserved for future use.
If none of the bits are set, the user has read-only authority.
Priority is given to login permissions that are retrieved directly from the
user record. If the login permission attribute is not in the user’s record, an
attempt is made to retrieve the permissions from the groups to which the
user belongs. This is done as part of the group authentication phase. The
user is assigned the inclusive OR of all the bits for all of the groups. The
Read Only bit is set only if all the other bits are zero. If the Deny Always
bit is set for any of the groups, the user is refused access. The Deny
Always bit always has precedence over every other bit.
Important:
If you give a user the ability to modify basic, networking, and
security-related IMM configuration parameters, consider giving
this same user the ability to restart the IMM (bit position 10).
Otherwise, a user might be able to change parameters (for
example, the IP address of the IMM) but cannot make them
take effect.
Service Location Protocol (SLP)
To view the SLP setting, complete the following steps:
1.
In the navigation pane, click
Network protocols
.
2.
Scroll down to the
Service Location Protocol (SLP)
area. The multicast address,
which is the IP address that the IMM SLP server listens on, is displayed.
Configuring security
Use the general procedure in this section to configure security for the IMM Web
server, for the connection between the IMM and an LDAP server. If you are not
familiar with the use of SSL certificates, read the information in “SSL certificate
overview” on page 39.
Use the following general tasks list to configure the security for the IMM:
1.
Configure the Secure Web server:
a.
Disable the SSL server. Use the
HTTPS Server Configuration for Web
Server
area on the Security page.
b.
Generate or import a certificate. Use the
HTTPS Server Certificate
Management
area on the Security page (see “SSL server certificate
management” on page 40).
c.
Enable the SSL server. Use the
HTTPS Server Configuration for Web
Server
area on the Security page (see “Enabling SSL for the secure Web
server” on page 43).
2.
Configure SSL security for LDAP connections:
38
Integrated Management Module: User Guide
|
|
|
|