HP 6125XLG R2306-HP 6125XLG Blade Switch Fundamentals Command Reference - Page 66

super, Examples, Related commands

Page 66 highlights

Rule Guidelines To control the access to a command, you must specify the command immediately after the view that has the command. To control access to a command, you must specify the command immediately behind the view to which the command is assigned. The rules that control command access for any subview do not apply to the command. For example, the "rule 1 deny command system ; interface * ; *" command string disables access to any command that is assigned to interface view, but you can still execute the acl number command in interface view, because this command is assigned to system view rather than interface view. To disable access to this command, use "rule 1 deny command system ; acl *;". Do not include the vertical bar (|), greater-than sign (>), or double greater-than sign (>>) when you specify display commands in a user role command rule. The system does not treat these redirect signs and the parameters that follow them as part of command lines, but in user role command rules, they are handled as part of command lines. As a result, no rule that includes any of these signs can find a match. For example, "rule 1 permit command display debugging > log" can never find a match, because the system has a display debugging command but not a display debugging > log command. Examples # Permit the user role role1 to execute the display acl command. system-view [Sysname] role name role1 [Sysname-role-role1] rule 1 permit command display acl # Permit the user role role1 to execute all commands that start with display. [Sysname-role-role1] rule 2 permit command display * # Permit the user role role1 to execute the radius scheme aaa command in system view and use all commands assigned to RADIUS scheme view. [Sysname-role-role1] rule 3 permit command system ; radius scheme aaa # Deny the access of role1 to any read or write command of any feature. [Sysname-role-role1] rule 4 deny read write feature # Deny the access of role1 to any read command of the feature aaa. [Sysname-role-role1] rule 5 deny read feature aaa # Permit role1 to access all read, write, and execute commands of the feature group security-features. [Sysname-role-role1] rule 6 permit read write execute feature-group security-features Related commands • display role • display role feature • display role feature-group • role super Use super to obtain a user role that you are not logged in with. 59

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221

59
Rule
Guidelines
To control the access to a
command, you must specify the
command immediately after the
view that has the command.
To control access to a command, you must specify the command
immediately behind the view to which the command is assigned. The rules
that control command access for any subview do not apply to the
command.
For example, the "rule 1 deny command system ; interface * ; *"
command string disables access to any command that is assigned to
interface view, but you can still execute the
acl number
command in
interface view, because this command is assigned to system view rather
than interface view. To disable access to this command, use "rule 1 deny
command system ; acl *;".
Do not include the vertical bar (|),
greater-than sign (>), or double
greater-than sign (>>) when you
specify
display
commands in a
user role command rule.
The system does not treat these redirect signs and the parameters that
follow them as part of command lines, but in user role command rules, they
are handled as part of command lines. As a result, no rule that includes
any of these signs can find a match.
For example, "rule 1 permit command display debugging > log" can
never find a match, because the system has a
display debugging
command but not a
display debugging
> log
command.
Examples
# Permit the user role
role1
to execute the
display acl
command.
<Sysname> system-view
[Sysname] role name role1
[Sysname-role-role1] rule 1 permit command display acl
# Permit the user role
role1
to execute all commands that start with
display
.
[Sysname-role-role1] rule 2 permit command display *
# Permit the user role
role1
to execute the
radius scheme aaa
command in system view and use all
commands assigned to RADIUS scheme view.
[Sysname-role-role1] rule 3 permit command system ; radius scheme aaa
# Deny the access of
role1
to any read or write command of any feature.
[Sysname-role-role1] rule 4 deny read write feature
# Deny the access of
role1
to any read command of the feature
aaa
.
[Sysname-role-role1] rule 5 deny read feature aaa
# Permit
role1
to access all read, write, and execute commands of the feature group
security-features
.
[Sysname-role-role1] rule 6 permit read write execute feature-group security-features
Related commands
display role
display role feature
display role feature-group
role
super
Use
super
to obtain a user role that you are not logged in with.