HP 6125XLG R2306-HP 6125XLG Blade Switch Fundamentals Command Reference - Page 49

display role feature, Related commands, Syntax, Views, Predefined user roles

Page 49 highlights

Field Permitted interfaces VPN instance policy Permitted VPN instances Rule Perm Type Scope Entity Description Interfaces accessible to the user role. VPN instance policy of the user role: • deny-Denies access to any VPN except permitted VPNs. • permit (default)-Default VPN instance policy, which enables the user role to access any VPN instance. VPNs accessible to the user role. User role rule number. A user role rule specifies the permission to access a command or a set of commands. Predefined user role rules are identified by sys-n, where n represents an integer. Access to the command: • permit-User role has access to the command. • deny-User role has no access to the command. Command type: • R-Read-only. • W-Write. • X-Execute. Rule control scope: • command-Controls access to the command or commands, as specified in the Entity field. • feature-Controls access to the commands of the feature, as specified in the Entity field. • feature-group-Controls access to the commands of the features in the feature group, as specified in the Entity field. Command string, feature name, or feature group specified in the user role rule: • An en dash (-) represents any feature. • An asterisk (*) represents zero or more characters. Related commands role display role feature Use display role feature to display features available in the system. Syntax display role feature [ name feature-name | verbose ] Views Any view Predefined user roles network-admin network-operator 42

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221

42
Field
Description
Permitted interfaces
Interfaces accessible to the user role.
VPN instance policy
VPN instance policy of the user role:
deny
—Denies access to any VPN except permitted VPNs.
permit (default)
—Default VPN instance policy, which enables the
user role to access any VPN instance.
Permitted VPN instances
VPNs accessible to the user role.
Rule
User role rule number.
A user role rule specifies the permission to access a command or a set
of commands. Predefined user role rules are identified by sys-n, where
n represents an integer.
Perm
Access to the command:
permit
—User role has access to the command.
deny
—User role has no access to the command.
Type
Command type:
R
—Read-only.
W
—Write.
X
—Execute.
Scope
Rule control scope:
command
—Controls access to the command or commands, as
specified in the Entity field.
feature
—Controls access to the commands of the feature, as
specified in the Entity field.
feature-group
—Controls access to the commands of the features in
the feature group, as specified in the Entity field.
Entity
Command string, feature name, or feature group specified in the user
role rule:
An en dash (–) represents any feature.
An asterisk (*) represents zero or more characters.
Related commands
role
display role feature
Use
display role feature
to display features available in the system.
Syntax
display role feature
[
name
feature-name
|
verbose
]
Views
Any view
Predefined user roles
network-admin
network-operator