User Delete Command - Equinox Systems Equinox Console Manager CCM4850 CCM4850 CCM4850 Installer/User Manual

Network device avocent hardware manual
Table of Contents

Advertisement

66
CCM4850 Installer/User Guide
Table 5.33: User Add Command (Continued)
Parameter
ACCESS=<access>
Examples
The following command adds the username JohnDoe, with the password secretname, access to
ports 2, 5, 6 and 7 and user and monitor access rights.
> user add JohnDoe password=secretname access=P2,5-7,user,smon
The following command adds the username JaneDoe, with access to all ports. The name of the SSH
public user key file is ccm_key2.pub. This file is located on the FTP server at IP address 10.0.0.3.
> user add JaneDoe ssh=ccm_key2.pub ftp=10.0.0.3 access=pall
The following command adds the username JDoe and gives that user the Appliance Administrator
access level, which enables access to all ports and CCM appliance commands.
> user add JDoe access=applianceadmin

User Delete command

The User Delete command removes a username entry from the CCM user database. The username
may no longer be used to authenticate a session with the CCM appliance. If the specified user is
currently logged in, a message is output to the user, indicating that access is no longer permitted,
and the Telnet session is terminated.
Access right: USER
Access level: ADMIN or APPLIANCEADMIN
Syntax
USER DEL <username>
Table 5.34: User Delete Command Parameter
Parameter
<username>
Description
Command and port access rights or level. You may specify multiple access rights,
separated by commas, or a level. Valid values for access rights are:
P<n>
P<x-y>
PALL
USER
PCON
SCON
SMON
BREAK
Valid values for access levels are:
ADMIN
APPLIANCEADMIN
Default = PALL,SMON
Description
Username to be deleted.
Access to the specified port number.
Access to the specified range of ports.
Access to all ports.
User configuration access rights.
Port configuration access rights.
Configuration access rights.
Monitor access rights.
Can issue Port Break command.
PALL, USER, SMON, PCON and BREAK access rights.
PALL, USER, SCON, SMON, PCON and BREAK
access rights.

Advertisement

Table of Contents
loading

Table of Contents

Save PDF