HP 3600 v2 Series Command Reference Manual page 37

Hide thumbs Also See for 3600 v2 Series:
Table of Contents

Advertisement

Parameters
acl acl-number: Specifies the authorization ACL. The ACL number must be in the range of 2000 to 5999.
After passing authentication, a local user is authorized to access the network resources specified by this
ACL.
callback-number callback-number: Specifies the authorization PPP callback number. callback-number is
a case-sensitive string of 1 to 64 characters. After a local user passes authentication, the switch uses this
number to call the user.
idle-cut minute: Sets the idle timeout period. With the idle cut function enabled, an online user whose idle
period exceeds the specified idle timeout period will be logged out. minute indicates the idle timeout
period, in the range of 1 to 120 minutes.
level level: Specifies the user level, which can be 0 for visit level, 1 for monitor level, 2 for system level,
and 3 for manage level. A smaller number means a lower level. If the user interfaces' authentication
mode is scheme, which commands users can use after login in depends on this argument. By default, the
user level is 0, and users can use only commands of level 0 after login.
user-profile profile-name: Specifies the authorization user profile. profile-name is a case-sensitive string
of 1 to 32 characters. It can consist of English letters, digits, and underlines and must start with an English
letter. After a user passes authentication and gets online, the switch uses the settings in the user profile to
restrict the access behavior of the user. For more information about user profiles, see Security
Configuration Guide.
user-role: Specifies the role for the local user. This keyword is available in only local user view. Users
playing different roles can access different levels of commands. If you specify no role for a local user, the
access right of the user after login depends on other authorization attributes. Supported roles include:
guest: A guest user account is usually created through the web interface.
guest-manager: After passing authentication, a guest manager can only use the web interface to
access guest-related pages to, for example, create, modify, or change guest user accounts.
security-audit: A local user playing this role is a security log administrator After passing
authentication, a security log administrator can manage security log files, for example, save
security log files. For more information about the commands that a security log administrator can
use, see Network Management and Monitoring Command Reference.
vlan vlan-id: Specifies the authorized VLAN. vlan-id is in the range of 1 to 4094. After passing
authentication, a local user can access the resources in this VLAN.
work-directory directory-name: Specifies the work directory, if the user or users use the FTP or SFTP
service. directory-name is a case-insensitive string of 1 to 135 characters. The directory must already exist.
By default, an FTP or SFTP user can access the root directory of the switch.
Description
Use the authorization-attribute command to configure authorization attributes for the local user or user
group. After the local user or a local user of the user group passes authentication, the switch will assign
these attributes to the user.
Use the undo authorization-attribute command to remove authorization attributes and restore the
defaults.
By default, no authorization attribute is configured for a local user or user group.
Every configurable authorization attribute has its definite application environments and purposes.
Consider the service types of users when assigning authorization attributes.
27

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents