1-22
Stinger®
Administration Guide
Administering a Stinger System
Managing administrative access to the unit
admin>
new user-group maintenance
USER-GROUP/maintenance read
admin>
set use-group-permissions = yes
admin>
set exclude-listed-commands = yes
admin>
set command 1 = reset
admin>
set command 2 = slot
admin>
set command 3 = read
admin>
write -f
USER-GROUP/maintenance written
When you change the
user-group
settings, the permissions of the associated users are
automatically adjusted. If a
user-group
profile is deleted, the sessions of all the
associated users are terminated.
Restricting access to profiles
You can maintain a list of system profiles that are critical to system security, for
which access is denied. You define the restricted profiles in the array called
profile
in
the
user-group
profile. Users that belong to this user group cannot perform
read
,
write
,
get
,
new
,
delete
, or
save
commands on restricted profiles. If a user attempts to
access a restricted profile, the system prompts the user with an access denial message.
In the following sample
user-group
profile called
remote,
users that belong to this
user group cannot perform
read
,
write
,
get
,
new
,
delete
, or
save
commands on the
user
,
ip-interface
, and
user-group
profiles.
[in USER-GROUP/remote (changed)]
name* = remote
use-group-permissions = no
allow-termserv = yes
allow-system = yes
allow-diagnostic = yes
allow-update = yes
allow-password = no
allow-code = no
allow-debug = no
exclude-listed-commands = no
command = [ "" "" "" "" "" "" "" "" "" "" "" "" "" "" "" "" "" "" "" "" "" "+
profile = [ user ip-int user-group "" "" "" "" "" "" "" "" "" "" "" "" "" ""
Verifying user group settings
The system does not prohibit you from entering a command user group or a user that
does not exist, nor from entering an invalid list of commands. Use the
usergroupcheck
command to verify that your specifications are valid. For syntax
information, see the
Stinger Reference
.
To verify that all the
user-group
profiles specify valid lists of commands and that all
user-group
profiles specified by
user
profiles are valid, use the
usergroupcheck
command with the
-a
option. For example:
admin>
usergroupcheck -a
All groups and users verified
Summary of Contents for Stinger
Page 1: ...Stinger Administration Guide Part Number 7820 0712 008 For software version 9 7 0 August 2004 ...
Page 4: ......
Page 16: ......
Page 18: ......
Page 62: ......
Page 82: ......
Page 96: ......
Page 182: ......
Page 218: ......
Page 236: ......
Page 252: ......
Page 288: ......
Page 350: ......
Page 362: ......
Page 374: ......