HP 10500 Series Configuration Manual page 62

Hide thumbs Also See for 10500 Series:
Table of Contents

Advertisement

User role name
mdc-admin
mdc-operator
level-n (n = 0 to 15)
security-audit
Permissions
Accesses all the features and resources in the administered MDC, except
for the display security-logfile summary, info-center security-logfile
directory, and security-logfile save commands.
Accesses the display commands for all the features and resources
available in the administered MDC, except for commands such as
display history-command all and display security-logfile summary. To
display all accessible commands of the user role, use the display role
name mdc-operator command.
Enables local authentication login users to change their own password.
level-0—Has access to diagnostic commands, including ping, quit,
ssh2, super, system-view, telnet, and tracert. Level-0 access rights are
configurable.
level-1—Has access to the display commands (except display
history-command all) of all features and resources in the system, in
addition to all access rights of the user role level-0. Level- 1 access rights
are configurable.
level-2 to level-8, and level-10 to level-14—Have no access rights by
default. Access rights are configurable.
level-9—Has access to all features and resources except those in the
following list. If you are logged in with a local user account that has a
level-9 user role, you can change the password in the local user account.
Level-9 access rights are configurable.
RBAC non-debugging commands.
Local users.
MDCs.
File management.
Device management.
The display history-command all command.
level-15—Has the same rights as network-admin on the default MDC,
and has the same rights as mdc-admin on non-default MDCs.
Security log manager. The user role has the following access to security log
files:
Access to the commands for displaying and maintaining security log
files (for example, the dir, display security-logfile summary, and more
commands).
Access to the commands for managing security log files and security log
file system (for example, the info-center security-logfile directory, mkdir,
and security-logfile save commands).
For more information about security log management, see Network
Management and Monitoring Configuration Guide. For more information
about file system management, see "Managing the file system."
IMPORTANT:
Only the security-audit user role has access to security log files. You can
configure other user roles to include the access permission of security log files,
but the configuration does not take effect.
54

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents