FibeAir IP-20C/S/E
User Guide
Ceragon Proprietary and Confidential
Page 528 of 597
21.3
Configuring Users (CLI)
This section includes:
User Configuration Overview (CLI)
Configuring User Profiles (CLI)
Configuring User Accounts (CLI)
Related topics:
21.3.1
User Configuration Overview (CLI)
User configuration is based on the Role-Based Access Control (RBAC) model.
According to the RBAC model, permissions to perform certain operations are
assigned to specific roles. Users are assigned to particular roles, and through
those role assignments acquire the permissions to perform particular system
functions.
In the IP-20 GUI, these roles are called user profiles. Up to 50 user profiles can
be configured. Each profile contains a set of privilege levels per functionality
group, and defines the management protocols (access channels) that can be
used to access the system by users to whom the user profile is assigned.
The system parameters are divided into the following functional groups:
Security
Management
Radio
TDM
Ethernet
Synchronization
A user profile defines the permitted access level per functionality group. For
each functionality group, the access level is defined separately for read and
write operations. The following access levels can be assigned:
None – No access to this functional group.
Normal – The user has access to parameters that require basic knowledge
about the functional group.
Advanced – The user has access to parameters that require advanced
knowledge about the functional group, as well as parameters that have a
significant impact on the system as a whole, such as restoring the
configuration to factory default settings.