23
web-menu
[
web-string
]
: Specifies a Web menu. The
web-string
argument represents the
ID path of the Web menu, a case-insensitive string of 1 to 255 characters. Use the forward slash (/) to
separate ID items, for example, M_DEVICE/I_BASIC_INFO/I_reboot. If you do not specify a Web
menu, the rule applies to all Web items. To verify the ID path of a Web menu, use the
display web
menu
command.
xml-element
[
xml-string
]
: Specifies an XML element. The
xml-string
argument
represents the XPath of the XML element, a case-insensitive string of 1 to 255 characters. Use the
forward slash (/) to separate Xpath items, for example, Interfaces/Index/Name. If you do not specify
an XML element, the rule applies to all XML elements.
all
: Specifies all the user role rules.
Usage guidelines
You can define the following types of rules for different access control granularities:
•
Command rule
—Controls access to a command or a set of commands that match a regular
expression.
•
Feature rule
—Controls access to the commands of a feature by command type.
•
Feature group rule
—Controls access to the commands of a group of features by command
type.
•
Web menu rule
—Controls access to Web menus by menu type.
•
XML element rule
—Controls access to XML elements by element type.
•
OID rule
—Controls access to the specified MIB node and its child nodes by node type.
A user role can access the set of permitted resources specified in the user role rules. User role rules
include predefined (identified by sys-n) and user-defined user role rules.
You can configure a maximum of 256 user-defined rules for a user role. The total number of
user-defined user role rules cannot exceed 1024.
Any rule modification, addition, or removal for a user role takes effect only on the users who log in
with the user role after the change.
Access to the file system commands is controlled by both the file system command rules and the file
system feature rule.
A command with output redirection to the file system is permitted only when the command type write
is assigned to the file system feature.
The following guidelines apply to non-OID rules:
•
If two user-defined rules of the same type conflict, the rule with the higher ID takes effect. For
example, a user role can use the
tracert
command but not the
ping
command if the user
role contains rules configured by using the following commands:
rule 1 permit command ping
rule 2 permit command tracert
rule 3 deny command ping
•
If a predefined user role rule and a user-defined user role rule conflict, the user-defined user
role rule takes effect.
The following guidelines apply to OID rules:
•
The system compares an OID with the OIDs specified in rules, and it uses the longest match
principle to select a rule for the OID. For example, a user role cannot access the MIB node with
OID 1.3.6.1.4.1.25506.141.3.0.1 if the user role contains rules configured by using the following
commands:
rule 1 permit read write oid 1.3.6
rule 2 deny read write oid 1.3.6.1.4.1
rule 3 permit read write oid 1.3.6.1.4
Summary of Contents for SOHO IE4300
Page 285: ...i Contents Tcl commands 1 cli 1 tclquit 1 tclsh 2...
Page 288: ...i Contents Python commands 1 exit 1 python 1 python filename 2...
Page 291: ...i Contents Automatic configuration commands 1 autodeploy udisk enable 1...
Page 323: ...25 Sysname Ten GigabitEthernet1 0 51 undo shutdown Related commands irf port...
Page 465: ...ii stp vlan enable 55 vlan mapping modulo 55...
Page 602: ...12 Related commands display mvrp statistics...
Page 609: ...i Contents VLAN mapping commands 1 display vlan mapping 1 vlan mapping 2...
Page 678: ...9 Related commands reset pppoe relay statistics...
Page 846: ...i Contents Basic IP forwarding commands 1 display fib 1 ip forwarding table save 2...
Page 1770: ...i Contents Time range commands 1 display time range 1 time range 1...
Page 2026: ...34 Related commands display mac authentication...
Page 2028: ...ii...
Page 2143: ...i Contents User profile commands 1 display user profile 1 user profile 2...
Page 2308: ...61 ipsec transform set...
Page 2531: ...i Contents SAVI commands 1 ipv6 savi down delay 1 ipv6 savi log enable 1 ipv6 savi strict 2...
Page 2534: ...3 Sysname ipv6 savi strict Related commands ipv6 verify source...
Page 2791: ...14 Sysname track 1 Related commands delay display track...
Page 2939: ...9 sntp authentication keyid sntp reliable authentication keyid...
Page 2967: ...27 Related commands apply poe profile poe enable poe max power interface view poe priority...