HP 6125XLG R2306-HP 6125XLG Blade Switch Fundamentals Configuration Guide - Page 68

Troubleshooting RBAC, Local users have more access permissions than intended, Symptom, Analysis

Page 68 highlights

ssh2 Establish a secure shell client connection super Switch to a user role system-view Enter the System View telnet Establish a telnet connection tracert Tracert function 2. Obtain the level-3 user role: # Use the super password to obtain the level-3 user role. When the system prompts for a username and password, enter the username test@bbb and password enabpass. super level-3 Username: test@bbb Password: The following output shows that you have obtained the level-3 user role. User privilege role is level-3, and only those commands that authorized to the role can be used. # If the ACS server does not respond, enter the local authentication password 654321 at the prompt. Invalid configuration or no response from the authentication server. Change authentication mode to local. Password: User privilege role is level-3, and only those commands that authorized to the role can be used. The output shows that you have obtained the level-3 user role. Troubleshooting RBAC This section describes several typical RBAC problems and their solutions. Local users have more access permissions than intended Symptom A local user can use more commands than should be permitted by the assigned user roles. Analysis The local user might have been assigned to user roles without your knowledge. For example, the local user is automatically assigned a default user role when you create it. Solution Use the display local-user command to examine the local user accounts for undesirable user roles, and delete them. Login attempts by RADIUS users always fail Symptom Attempts by a RADIUS user to log in to the network access device always fail, even though the network access device and the RADIUS server can communicate with one another and all AAA settings are correct. 61

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155

61
ssh2
Establish a secure shell client connection
super
Switch to a user role
system-view
Enter the System View
telnet
Establish a telnet connection
tracert
Tracert function
2.
Obtain the level-3 user role:
# Use the super password to obtain the level-3 user role. When the system prompts for a username
and password, enter the username
test@bbb
and password
enabpass
.
<Switch> super level-3
Username: test@bbb
Password:
The following output shows that you have obtained the level-3 user role.
User privilege role is level-3, and only those commands that authorized to the role
can be used.
# If the ACS server does not respond, enter the local authentication password
654321
at the
prompt.
Invalid configuration or no response from the authentication server.
Change authentication mode to local.
Password:
User privilege role is level-3, and only those commands that authorized to the role
can be used.
The output shows that you have obtained the level-3 user role.
Troubleshooting RBAC
This section describes several typical RBAC problems and their solutions.
Local users have more access permissions than intended
Symptom
A local user can use more commands than should be permitted by the assigned user roles.
Analysis
The local user might have been assigned to user roles without your knowledge. For example, the local
user is automatically assigned a default user role when you create it.
Solution
Use the
display local-user
command to examine the local user accounts for undesirable user roles, and
delete them.
Login attempts by RADIUS users always fail
Symptom
Attempts by a RADIUS user to log in to the network access device always fail, even though the network
access device and the RADIUS server can communicate with one another and all AAA settings are
correct.