HP 6125XLG R2306-HP 6125XLG Blade Switch Fundamentals Configuration Guide - Page 55

Changing the VLAN policy of a user role, Changing the VPN instance policy of a user role, Assigning

Page 55 highlights

Changing the VLAN policy of a user role Step 1. Enter system view. 2. Enter user role view. Command system-view role name role-name 3. Enter user role VLAN policy view. vlan policy deny 4. (Optional.) Specify a list of VLANs accessible to the permit vlan vlan-id-list user role. Remarks N/A N/A By default, the VLAN policies of user roles permit access to all VLANs. This command disables the access of the user role to any VLAN. By default, no accessible VLANs are configured. To add more accessible VLANs, repeat this step. Changing the VPN instance policy of a user role Step 1. Enter system view. 2. Enter user role view. 3. Enter user role VPN instance policy view. Command system-view role name role-name vpn-instance policy deny 4. (Optional.) Specify a list of VPNs accessible to the user permit vpn-instance role. vpn-instance-name& Remarks N/A N/A By default, the VPN policies of user roles permit access to all VPNs. This command disables the access of the user role to any VPN. By default, no accessible VPNs are configured. To add more accessible VPNs, repeat this step. Assigning user roles To control user access to the system, you must assign at least one user role. Make sure at least one user role among the user roles assigned by the server exists on the device. User role assignment procedure varies with remote AAA authentication users, local AAA authentication users, and non-AAA authentication users (see "Assigning user roles"). For more information about AAA authentication, see Security Configuration Guide. Enabling the default user role function An AAA authentication user must have at least one user role to log in to the device. The default user role function assigns the network-operator user role to a local or remote AAA authenticated user if the AAA server has not authorized the user to use any user roles. Without the function, AAA authenticated users cannot access the system if they have no user role authorization. To enable the default user role function for AAA authentication users: 48

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155

48
Changing the VLAN policy of a user role
Step
Command
Remarks
1.
Enter system view.
system-view
N/A
2.
Enter user role view.
role name
role-name
N/A
3.
Enter user role VLAN policy
view.
vlan policy deny
By default, the VLAN policies of user
roles permit access to all VLANs.
This command disables the access of
the user role to any VLAN.
4.
(Optional.) Specify a list of
VLANs accessible to the
user role.
permit vlan
vlan-id-list
By default, no accessible VLANs are
configured.
To add more accessible VLANs,
repeat this step.
Changing the VPN instance policy of a user role
Step
Command
Remarks
1.
Enter system view.
system-view
N/A
2.
Enter user role view.
role name
role-name
N/A
3.
Enter user role VPN
instance policy view.
vpn-instance policy deny
By default, the VPN policies of user
roles permit access to all VPNs.
This command disables the access of
the user role to any VPN.
4.
(Optional.) Specify a list of
VPNs accessible to the user
role.
permit vpn-instance
vpn-instance-name
&<1-10>
By default, no accessible VPNs are
configured.
To add more accessible VPNs, repeat
this step.
Assigning user roles
To control user access to the system, you must assign at least one user role. Make sure at least one user
role among the user roles assigned by the server exists on the device. User role assignment procedure
varies with remote AAA authentication users, local AAA authentication users, and non-AAA
authentication users (see "
Assigning user roles
"). For more information about AAA authentication, see
Security Configuration Guide
.
Enabling the default user role function
An AAA authentication user must have at least one user role to log in to the device. The default user role
function assigns the network-operator user role to a local or remote AAA authenticated user if the AAA
server has not authorized the user to use any user roles. Without the function, AAA authenticated users
cannot access the system if they have no user role authorization.
To enable the default user role function for AAA authentication users: