Access Control Commands - IBM Network Management Card User Manual

Table of Contents

Advertisement

Table 33. Shutdown commands (continued)
Example
#> setShutdown 1 ShutdownDuration=120

Access control commands

Use the access control commands in the following table to configure secure access
to the network management card.
Table 34. Access control commands
getAccess
Read an access control setting.
Syntax
getAccess [option1] [option2]
Options
Login | Password | Security
Example
#> getAcess Login
Comments
For Password, each character is replaced with an asterisk (*).
setAccess
Modify an access control setting.
Syntax
setAccess [option1] [option2]
Options
Login = "xx..xx"
Password = "**..**" (See Note 1)
Security = 1 | 2 | 3 (1=configuration pages, 2=full authorization, 3=full authorization and SSL)
Example
#> setAccess Security=3
Comments
Note 1: Remember to set echo off.
getTelnet
Read a Telnet setting.
Syntax
getTelnet [option1] [option2]
Options
Access | Security | Console
Example
#> getTelnet Security
setTelnet
Modify a Telnet setting.
Syntax
setTelnet [option1] [option2]
Options
Access = 0 | 1
Security = 0 | 1
Console = CLI | Menu
Example
#> setTelnet Security=0
Date and time commands
Use the date and time commands in the following table to set the date and time
parameters for the network management card.
Table 35. Date and time commands
getDate
Read a date and time setting.
Syntax
getDate [option1] [option2]
Options
Date | Time | TimeSync | TimeNtp | TimeZone | TimeDaylight
Example
#> getDate timeSync
setDate
Modify a date and time setting.
58
Network Management Card : User's Guide
(0=Disabled, 1=Enabled)
(0=No, 1=Yes with SSH)

Advertisement

Table of Contents
loading

Table of Contents