Dynamic Tables Vs. Static Tables; Secret Tables; Table Permissions - 3Com VCX v7111 User Manual

Voip
Hide thumbs Also See for VCX v7111:
Table of Contents

Advertisement

In the example provided in
mark lines.
In the example provided in
method is a result of the application it represents.

Table Permissions

Each column has a 'permission' attribute that is applied to all instances in the column. This
permission determines if and when a field can be modified. Several permissions can be
applied to each column.
The following permissions are available:
Read: The value of the field can be read.
Write: The value of the field can be modified.
Create: A value for the field must be provided at creation time (the default values, set to
all fields, determine the initial values).
Maintenance Write: The value of the field can only be modified when the entity
represented by the line is in maintenance state (each table includes rules that determine
when it is in maintenance state).
In the example in
Table 86
have Read-Create permissions. The column Time Connected has a Read permission, and
the column Permissions has Read-Create-Maintenance Write permissions.

Dynamic Tables vs. Static Tables

Static Tables: Static tables do not support adding new lines or removing (deleting)
existing lines. All lines in a Static table are pre-configured with default values. Users can
only modify the values of the existing lines. After reset, all lines in a Static table are
available.
Dynamic Tables: Dynamic tables support adding and removing lines. They are always
initialized as empty tables with no lines. Users should add lines to a Dynamic table using
the ini file or at run-time using the Embedded Web Server for example.
Certain dynamic tables may initialize a line (or more) at start-up. If so, it is explained
in the specific table's documentation.

Secret Tables

A table is defined as a secret table if it contains at least a single secret data field or if it
depends on another secret table. A secret data field is a field that must not be revealed to
the user. For example, in the IPSec application, IPSec tables are defined as secret tables as
the IKE table contains a pre-shared key that must be concealed. Therefore, the SPD table
that depends on the IKE table is defined as a secret table as well.
306
Table 86
there is only one Index field. This is the simplest way to
Table 87
there are three Index fields. This more complicated
it is assumed that the columns User Name and User Password
3Com
®
VCX V7111 VoIP Gateway User Guide

Advertisement

Table of Contents
loading

Table of Contents