HP 6125XLG R2306-HP 6125XLG Blade Switch Security Command Reference - Page 29

Views, Predefined user roles, Parameters, Usage guidelines, acl-number, minute, role-name

Page 29 highlights

Views Local user view, user group view Predefined user roles network-admin Parameters acl acl-number: Specifies the authorization ACL. The ACL number must be in the range of 2000 to 5999. After passing authentication, a local user can access the network resources specified by this ACL. idle-cut minute: Sets the idle timeout period. With the idle cut function enabled, an online user whose idle period exceeds the specified idle timeout period is logged out. The minute argument must be in the range of 1 to 120 minutes. user-role role-name: Specifies the authorized user role. The role-name argument is a case-sensitive string of 1 to 63 characters. The default user role for a local user created by a network-admin user is network-operator. Up to 64 user roles can be specified for a user. For user role-related commands, see Fundamentals Command Reference for RBAC commands. This option is available only in local user view, and is not available in user group view. vlan vlan-id: Specifies the authorized VLAN. The vlan-id argument is in the range of 1 to 4094. After a passing authentication and being authorized a VLAN, a local user can access only the resources in this VLAN. work-directory directory-name: Specifies the work directory for FTP, SFTP, or SCP users. The directory-name argument is a case-insensitive string of 1 to 512 characters. The directory must already exist. By default, an FTP, SFTP, or SCP user can access the root directory of the device. Usage guidelines Every configurable authorization attribute has its definite application environments and purposes. Consider the service types of users when assigning authorization attributes: • For LAN users, only the authorization attributes acl, idle-cut, and vlan are effective. • For HTTP, HTTPS, Telnet, and terminal users, only the authorization attribute user-role is effective. • For SSH and FTP users, only the authorization attributes user-role and work-directory are effective. • For other types of local users, no authorization attribute is effective. Authorization attributes configured for a user group are intended for all local users in the group. You can group local users to improve configuration and management efficiency. An authorization attribute configured in local user view takes precedence over the same attribute configured in user group view. To make the user have only the user role authorized by this command, use the undo authorization-attribute user-role command to remove the predefined user roles. The security-audit user role has access to the commands for managing security log files and security log file system. To display all the accessible commands of the user role, use the display role name security-audit command. For more information about security log management, see Network Management and Monitoring. For more information about file system management, see Fundamentals Configuration Guide. When you configure the security-audit user role, follow these restrictions and guidelines: • If the device has local users who are assigned the security-audit user role, you cannot delete the last local user who has this user role. • The user role security-audit is mutually exclusive with other user roles. When you assign the security-audit user role to a local user, the system asks for your confirmation to delete all the other 20

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321

20
Views
Local user view, user group view
Predefined user roles
network-admin
Parameters
acl
acl-number
: Specifies the authorization ACL. The ACL number must be in the range of 2000 to 5999.
After passing authentication, a local user can access the network resources specified by this ACL.
idle-cut
minute
: Sets the idle timeout period. With the idle cut function enabled, an online user whose idle
period exceeds the specified idle timeout period is logged out. The
minute
argument must be in the range
of 1 to 120 minutes.
user-role
role-name
: Specifies the authorized user role. The
role-name
argument is a case-sensitive string
of 1 to 63 characters. The default user role for a local user created by a network-admin user is
network-operator. Up to 64 user roles can be specified for a user. For user role-related commands, see
Fundamentals Command Reference
for RBAC commands. This option is available only in local user view,
and is not available in user group view.
vlan
vlan-id
: Specifies the authorized VLAN. The
vlan-id
argument
is in the range of 1 to 4094. After a
passing authentication and being authorized a VLAN, a local user can access only the resources in this
VLAN.
work-directory
directory-name
: Specifies the work directory for FTP, SFTP, or SCP users. The
directory-name
argument is a case-insensitive string of 1 to 512 characters. The directory must already
exist. By default, an FTP, SFTP, or SCP user can access the root directory of the device.
Usage guidelines
Every configurable authorization attribute has its definite application environments and purposes.
Consider the service types of users when assigning authorization attributes:
For LAN users, only the authorization attributes
acl
,
idle-cut
, and
vlan
are effective.
For HTTP, HTTPS, Telnet, and terminal users, only the authorization attribute
user-role
is
effective.
For SSH and FTP users, only the authorization attributes
user-role
and
work-directory
are effective.
For other types of local users, no authorization attribute is effective.
Authorization attributes configured for a user group are intended for all local users in the group. You can
group local users to improve configuration and management efficiency. An authorization attribute
configured in local user view takes precedence over the same attribute configured in user group view.
To make the user have only the user role authorized by this command, use the
undo
authorization-attribute
user-role
command to remove the predefined user roles.
The security-audit user role has access to the commands for managing security log files and security log
file system. To display all the accessible commands of the user role, use the
display role name
security-audit
command. For more information about security log management, see
Network
Management and Monitoring
. For more information about file system management, see
Fundamentals
Configuration Guide
.
When you configure the security-audit user role, follow these restrictions and guidelines:
If the device has local users who are assigned the security-audit user role, you cannot delete the last
local user who has this
user role.
The user role
security-audit
is mutually exclusive with other user roles. When you assign the
security-audit
user role to a local user, the system asks for your confirmation to delete all the other