HP 6125XLG R2306-HP 6125XLG Blade Switch Fundamentals Command Reference - Page 60

permit vpn-instance

Page 60 highlights

• vlan policy deny permit vpn-instance Use permit vpn-instance to configure a list of VPNs accessible to a user role. Use undo permit vpn-instance to disable the access of a user role to specific VPNs. Syntax permit vpn-instance vpn-instance-name& undo permit vpn-instance [ vpn-instance-name& ] Default No permitted VPNs are configured in user role VPN instance policy. Views User role VPN instance policy view Predefined user roles network-admin Parameters vpn-instance-name&: Specifies a space-separated list of up to 10 MPLS L3VPN names. Each name is a case-sensitive string of 1 to 31 characters. Usage guidelines To permit a user role to access an MPLS L3VPN after you configure the vpn-instance policy deny command, you must add the VPN to the permitted VPN list of the policy. With the user role, you can create, remove, configure only the VPNs in the permitted VPN list, enter their views, and specify them in a feature command. You can repeat the permit vpn-instance command to add permitted MPLS L3VPNs to a user role interface policy. The undo permit interface command removes the entire list of permitted VPNs if no VPN is specified. Any change to a user role VPN instance policy takes effect only on users that log in with the user role after the change. Examples # Permit the user role role1 to access VPN 1 and to execute all the commands available in system view and in the child views of system view. system-view [Sysname] role name role1 [Sysname-role-role1] rule 1 permit command system-view ; * [Sysname-role-role1] vpn policy deny [Sysname-role-role1-vpnpolicy] permit vpn-instance vpn1 Verify that you cannot use the user role to work on any VPN but VPN 1: # Verify that you can enter VPN1 view. system-view [Sysname] ip vpn-instance vpn1 [Sysname-vpn-instance-vpn1] 53

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221

53
vlan policy deny
permit vpn-instance
Use
permit vpn-instance
to configure a list of VPNs accessible to a user role.
Use
undo permit vpn-instance
to disable the access of a user role to specific VPNs.
Syntax
permit vpn-instance
vpn-instance-name
&<1-10>
undo permit vpn-instance
[
vpn-instance-name
&<1-10>
]
Default
No permitted VPNs are configured in user role VPN instance policy.
Views
User role VPN instance policy view
Predefined user roles
network-admin
Parameters
vpn-instance-name
&<1-10>: Specifies a space-separated list of up to 10 MPLS L3VPN names. Each
name is a case-sensitive string of 1 to 31 characters.
Usage guidelines
To permit a user role to access an MPLS L3VPN after you configure the
vpn-instance policy deny
command, you must add the VPN to the permitted VPN list of the policy. With the user role, you can
create, remove, configure only the VPNs in the permitted VPN list, enter their views, and specify them in
a feature command.
You can repeat the
permit vpn-instance
command to add permitted MPLS L3VPNs to a user role interface
policy.
The
undo permit interface
command removes the entire list of permitted VPNs if no VPN is specified.
Any change to a user role VPN instance policy takes effect only on users that log in with the user role after
the change.
Examples
# Permit the user role
role1
to access VPN 1 and to execute all the commands available in system view
and in the child views of system view.
<Sysname> system-view
[Sysname] role name role1
[Sysname-role-role1] rule 1 permit command system-view ; *
[Sysname-role-role1] vpn policy deny
[Sysname-role-role1-vpnpolicy] permit vpn-instance vpn1
Verify that you cannot use the user role to work on any VPN but VPN 1:
# Verify that you can enter VPN1 view.
<Sysname> system-view
[Sysname] ip vpn-instance vpn1
[Sysname-vpn-instance-vpn1]