User Guide for FibeAir® IP-20 All-Outdoor Products, CeraOS 10.5
Page 686 of 825
Ceragon Proprietary and Confidential
•
Configuring User Profiles (CLI)
•
Configuring User Accounts (CLI)
Related topics:
•
21.3.1
User Configuration Overview (CLI)
User configuration is based on the Role-Based Access Control (RBAC) model.
According to the RBAC model, permissions to perform certain operations are
assigned to specific roles. Users are assigned to particular roles, and through
those role assignments acquire the permissions to perform particular system
functions.
In the IP-20 GUI, these roles are called user profiles. Up to 50 user profiles can be
configured. Each profile contains a set of privilege levels per functionality group,
and defines the management protocols (access channels) that can be used to
access the system by users to whom the user profile is assigned.
The system parameters are divided into the following functional groups:
•
Security
•
Management
•
Radio
•
TDM
•
Ethernet
•
Synchronization
A user profile defines the permitted access level per functionality group. For each
functionality group, the access level is defined separately for read and write
operations. The following access levels can be assigned:
•
None
–
No access to this functional group.
•
Normal
–
The user has access to parameters that require basic knowledge
about the functional group.
•
Advanced
–
The user has access to parameters that require advanced
knowledge about the functional group, as well as parameters that have a
significant impact on the system as a whole, such as restoring the
configuration to factory default settings.
21.3.2
Configuring User Profiles (CLI)
User profiles enable you to define system access levels. Each user must be
assigned a user profile. Each user profile contains a detailed set of read
and write permission levels per functionality group.
The system includes a number of pre-defined user profiles. You can edit these
profiles, and add user profiles. Together, the system supports up to 50 user
profiles.
To create a new user profile with default settings, enter the following command:
root> platform security access-control profile add name
<profile-name>