Table Permissions; Dynamic Tables Vs. Static Tables; Secret Tables - 3Com V7122 User Manual

Hide thumbs Also See for V7122:
Table of Contents

Advertisement

In the example provided in
method is a result of the application it represents.

Table Permissions

Each column has a 'permission' attribute that is applied to all instances in the column. This
permission determines if and when a field can be modified. Several permissions can be
applied to each column.
The following permissions are available:
Read: Value of the field can be read.
Write: Value of the field can be modified.
Create: Value for the field must be provided at creation time (the default values, set to all
fields, determine the initial values).
Maintenance Write: The value of the field can only be modified when the entity
represented by the line is in maintenance state (each table includes rules that determine
when it is in maintenance state).
In the example in
Table 58
have Read-Create permissions. The column 'Time Connected' has a Read permission, and
the column 'Permissions' has Read-Create-Maintenance Write permissions.

Dynamic Tables vs. Static Tables

Static Tables: Static tables don't support adding new lines or removing (deleting)
existing lines. All lines in a Static table are pre-configured with default values. Users can
only modify the values of the existing lines. After reset, all lines in a Static table are
available.
Dynamic Tables: Dynamic tables support adding and removing lines. They are always
initialized as empty tables with no lines. Users should add lines to a Dynamic table using
the ini file or at run-time using the Embedded Web Server for example.
Certain dynamic tables may initialize a line (or more) at start-up. If so, it is
explained in the specific table's documentation.

Secret Tables

A table is defined as a secret table if it contains at least a single secret data field or if it
depends on another secret table. A secret data field is a field that mustn't be revealed to the
user. For example, in the IPSec application, IPSec tables are defined as secret tables as the
IKE table contains a pre-shared key that must be concealed. Therefore, the SPD table that
depends on the IKE table is defined as a secret table as well.
There are two major differences between tables and secret tables:
The secret field itself cannot be viewed using SNMP, Web or any other application.
302
Table 59
there are three Index fields. This more complicated
it is assumed that the columns 'User Name' and 'User Password'
V7122 GatewayUser Guide

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the V7122 and is the answer not in the manual?

Questions and answers

Table of Contents