V7版H3C交换机level 0-15分别是什么权限
(0)
最佳答案
<Sysname> display role
Role: network-admin
Description: Predefined network admin role has access to all commands on the d
evice
VLAN policy: permit (default)
Interface policy: permit (default)
VPN instance policy: permit (default)
-------------------------------------------------------------------
Rule Perm Type Scope Entity
-------------------------------------------------------------------
sys-1 permit command *
sys-2 permit RWX web-menu -
sys-3 permit RWX xml-element -
sys-4 deny command display security-logfile summary
sys-5 deny command system-view ; info-center securi
ty-logfile directory *
sys-6 deny command security-logfile save
sys-7 permit RW- oid 1
R:Read W:Write X:Execute
Role: network-operator
Description: Predefined network operator role has access to all read commands
on the device
VLAN policy: permit (default)
Interface policy: permit (default)
VPN instance policy: permit (default)
-------------------------------------------------------------------
Rule Perm Type Scope Entity
-------------------------------------------------------------------
sys-1 permit command display *
sys-2 permit command xml
sys-3 permit command system-view ; probe ; display *
sys-4 deny command display history-command all
sys-5 deny command display exception *
sys-6 deny command display cpu-usage configuration
*
sys-7 deny command display kernel exception *
sys-8 deny command display kernel deadloop *
sys-9 deny command display kernel starvation *
sys-10 deny command display kernel reboot *
sys-11 deny command display memory trace *
sys-12 deny command display kernel memory *
sys-13 permit command system-view ; local-user *
sys-14 permit command system-view ; switchto *
sys-15 permit R-- web-menu -
sys-16 permit R-- xml-element -
sys-17 deny command display security-logfile summary
sys-18 deny command system-view ; info-center securi
ty-logfile directory *
sys-19 deny command security-logfile save
sys-20 deny command system-view ; local-user-import
*
sys-21 deny command system-view ; local-user-export
*
sys-22 permit R-- oid 1
R:Read W:Write X:Execute
Role: mdc-admin
Description: Predefined MDC admin role has access to all commands within an MD
C
VLAN policy: permit (default)
Interface policy: permit (default)
VPN instance policy: permit (default)
-------------------------------------------------------------------
Rule Perm Type Scope Entity
-------------------------------------------------------------------
sys-1 permit command *
sys-2 permit RWX web-menu -
sys-3 permit RWX xml-element -
sys-4 deny RWX feature mdc
sys-5 deny RWX feature install
sys-6 deny RWX feature irf
sys-7 permit command display version *
sys-8 permit command display copyright
sys-9 permit command system-view ; probe ; display sy
stem internal version *
sys-13 deny RWX feature vcf
sys-14 deny RWX feature smartmc
sys-15 permit command display mdc *
sys-19 deny command display security-logfile summary
sys-20 deny command system-view ; info-center securi
ty-logfile directory *
sys-21 deny command security-logfile save
sys-22 permit RW- oid 1
sys-23 deny command display fips status
sys-27 deny command display crypto version
sys-30 deny command system-view ; fips mode enable
sys-31 deny command system-view ; undo fips mode ena
ble
sys-37 deny command system-view ; max-ecmp-num *
sys-38 deny command display max-ecmp-num
sys-43 deny command system-view ; interface * ; usin
g tengige *
sys-44 deny command system-view ; interface * ; undo
using tengige *
sys-45 deny command system-view ; interface * ; usin
g fortygige *
sys-46 deny command system-view ; interface * ; undo
using fortygige *
sys-47 deny command system-view ; interface * ; usin
g hundredgige *
sys-48 deny command system-view ; interface * ; undo
using hundredgige *
sys-49 deny command system-view ; interface * ; usin
g twentygige *
sys-50 deny command system-view ; interface * ; undo
using twentygige *
sys-51 deny command system-view ; interface * ; usin
g twenty-fivegige *
sys-52 deny command system-view ; interface * ; undo
using twenty-fivegige *
sys-53 deny command system-view ; using hundredgige-
from-fortygige *
sys-55 deny command system-view ; using fortygige-fr
om-hundredgige *
sys-60 deny command system-view ; probe; display sys
tem internal file *
sys-61 deny command system-view ; probe; display sys
tem internal hook *
sys-62 deny command system-view ; probe; hook *
sys-68 deny command system-view ; clock *
sys-69 deny command system-view ; undo clock *
sys-70 deny command system-view ; version check igno
re
sys-71 deny command system-view ; undo version check
ignore
sys-72 deny command system-view ; version auto-updat
e enable
sys-73 deny command system-view ; undo version auto-
update enable
sys-78 deny command system-view ; switch-fabric *
sys-79 deny command system-view ; undo switch-fabric
*
sys-80 deny command system-view ; fabric load-sharin
g mode *
sys-81 deny command system-view ; memory-threshold *
sys-82 deny command system-view ; undo memory-thresh
old *
sys-88 deny command system-view ; password-recovery
enable
sys-89 deny command system-view ; undo password-reco
very enable
sys-98 deny command system-view ; monitor kernel *
sys-99 deny command system-view ; undo monitor kerne
l *
sys-108 deny command system-view ; poe *
sys-109 deny command system-view ; undo poe *
sys-110 permit command system-view ; poe-profile *
sys-111 permit command system-view ; undo poe-profile *
sys-112 deny command system-view ; system-working-mod
e *
sys-113 deny command system-view ; undo system-workin
g-mode
sys-119 deny command system-view ; forward-path-detec
tion enable
sys-120 deny command system-view ; hardware-failure-d
etection *
sys-121 deny command system-view ; undo hardware-fail
ure-detection *
sys-122 deny command system-view ; forward-path-detec
tion enable
sys-123 deny command system-view ; undo forward-path-
detection enable
sys-124 deny command system-view ; hardware-failure-p
rotection aggregation
sys-125 deny command system-view ; undo hardware-fail
ure-protection aggregation
sys-127 deny command display debugging dev
sys-128 deny command clock *
sys-132 deny command display alarm *
sys-138 deny command display hardware-failure-detecti
on
sys-141 deny command display memory-threshold *
sys-142 deny command display power-supply *
sys-145 deny command display system-working-mode
sys-150 deny command display system stable state mdc
*
sys-153 deny command restore factory-default
sys-154 deny command reset scheduler logfile
sys-155 deny command bootrom *
sys-162 deny command display poe device
sys-164 deny command display poe pse *
sys-165 deny command display poe-power
sys-167 deny command display kernel exception *
sys-168 deny command display kernel deadloop *
sys-169 deny command display kernel starvation *
sys-170 deny command display kernel reboot *
sys-171 deny command display kernel memory *
sys-172 deny command kernel memory trace *
sys-173 deny command undo kernel memory trace *
sys-175 deny command reset kernel *
sys-177 deny command reboot slot *
sys-183 deny command format *
sys-184 deny command mount *
sys-185 deny command umount *
sys-186 deny command fixdisk *
sys-187 deny command fdisk *
R:Read W:Write X:Execute
Role: mdc-operator
Description: Predefined MDC operator role has access to all read commands with
in an MDC
VLAN policy: permit (default)
Interface policy: permit (default)
VPN instance policy: permit (default)
-------------------------------------------------------------------
Rule Perm Type Scope Entity
-------------------------------------------------------------------
sys-1 permit command display *
sys-2 permit command xml
sys-3 deny command display history-command all
sys-4 deny command display exception *
sys-5 deny command display cpu-usage configuration
*
sys-6 deny command display kernel exception *
sys-7 deny command display kernel deadloop *
sys-8 deny command display kernel starvation *
sys-9 deny command display kernel reboot *
sys-10 deny command display memory trace *
sys-11 deny command display kernel memory *
sys-12 permit command system-view ; local-user *
sys-15 permit R-- web-menu -
sys-16 permit R-- xml-element -
sys-17 deny command display security-logfile summary
sys-18 deny command system-view ; info-center securi
ty-logfile directory *
sys-19 deny command security-logfile save
sys-20 permit R-- oid 1
sys-21 deny command display alarm *
sys-27 deny command display hardware-failure-detecti
on
sys-30 deny command display memory-threshold *
sys-31 deny command display power-supply *
sys-34 deny command display system-working-mode
sys-39 deny command display system stable state mdc
*
sys-44 deny command display poe device
sys-46 deny command display poe pse *
sys-47 deny command display poe-power *
sys-49 deny command display smartmc *
R:Read W:Write X:Execute
Role: level-0
Description: Predefined level-0 role
VLAN policy: permit (default)
Interface policy: permit (default)
VPN instance policy: permit (default)
-------------------------------------------------------------------
Rule Perm Type Scope Entity
-------------------------------------------------------------------
sys-1 permit command tracert *
sys-2 permit command telnet *
sys-3 permit command ping *
sys-4 permit command ssh2 *
sys-5 permit command super *
sys-6 permit command mtrace *
R:Read W:Write X:Execute
Role: level-1
Description: Predefined level-1 role
VLAN policy: permit (default)
Interface policy: permit (default)
VPN instance policy: permit (default)
-------------------------------------------------------------------
Rule Perm Type Scope Entity
-------------------------------------------------------------------
sys-1 permit command tracert *
sys-2 permit command telnet *
sys-3 permit command ping *
sys-4 permit command ssh2 *
sys-5 permit command display *
sys-6 permit command super *
sys-7 deny command display history-command all
sys-8 permit command mtrace *
R:Read W:Write X:Execute
Role: level-2
Description: Predefined level-2 role
VLAN policy: permit (default)
Interface policy: permit (default)
VPN instance policy: permit (default)
Role: level-3
Description: Predefined level-3 role
VLAN policy: permit (default)
Interface policy: permit (default)
VPN instance policy: permit (default)
Role: level-4
Description: Predefined level-4 role
VLAN policy: permit (default)
Interface policy: permit (default)
VPN instance policy: permit (default)
Role: level-5
Description: Predefined level-5 role
VLAN policy: permit (default)
Interface policy: permit (default)
VPN instance policy: permit (default)
Role: level-6
Description: Predefined level-6 role
VLAN policy: permit (default)
Interface policy: permit (default)
VPN instance policy: permit (default)
Role: level-7
Description: Predefined level-7 role
VLAN policy: permit (default)
Interface policy: permit (default)
VPN instance policy: permit (default)
Role: level-8
Description: Predefined level-8 role
VLAN policy: permit (default)
Interface policy: permit (default)
VPN instance policy: permit (default)
Role: level-9
Description: Predefined level-9 role
VLAN policy: permit (default)
Interface policy: permit (default)
VPN instance policy: permit (default)
-------------------------------------------------------------------
Rule Perm Type Scope Entity
-------------------------------------------------------------------
sys-1 permit RWX feature -
sys-2 deny RWX feature device
sys-3 deny RWX feature filesystem
sys-4 permit command display *
sys-5 deny command display history-command all
R:Read W:Write X:Execute
Role: level-10
Description: Predefined level-10 role
VLAN policy: permit (default)
Interface policy: permit (default)
VPN instance policy: permit (default)
Role: level-11
Description: Predefined level-11 role
VLAN policy: permit (default)
Interface policy: permit (default)
VPN instance policy: permit (default)
Role: level-12
Description: Predefined level-12 role
VLAN policy: permit (default)
Interface policy: permit (default)
VPN instance policy: permit (default)
Role: level-13
Description: Predefined level-13 role
VLAN policy: permit (default)
Interface policy: permit (default)
VPN instance policy: permit (default)
Role: level-14
Description: Predefined level-14 role
VLAN policy: permit (default)
Interface policy: permit (default)
VPN instance policy: permit (default)
Role: level-15
Description: Predefined level-15 role
VLAN policy: permit (default)
Interface policy: permit (default)
VPN instance policy: permit (default)
-------------------------------------------------------------------
Rule Perm Type Scope Entity
-------------------------------------------------------------------
sys-1 permit command *
sys-2 permit RWX web-menu -
sys-3 permit RWX xml-element -
sys-4 deny command display security-logfile summary
sys-5 deny command system-view ; info-center securi
ty-logfile directory *
sys-6 deny command security-logfile save
sys-7 permit RW- oid 1
R:Read W:Write X:Execute
Role: security-audit
Description: Predefined security audit role only has access to commands for th
e security log administrator
VLAN policy: permit (default)
Interface policy: permit (default)
VPN instance policy: permit (default)
-------------------------------------------------------------------
Rule Perm Type Scope Entity
-------------------------------------------------------------------
sys-1 deny command *
sys-2 permit command display security-logfile summary
sys-3 permit command system-view ; info-center securi
ty-logfile directory *
sys-4 permit command security-logfile save
sys-5 permit command cd *
sys-6 permit command copy *
sys-7 permit command delete *
sys-8 permit command dir *
sys-9 permit command mkdir *
sys-10 permit command more *
sys-11 permit command move *
sys-12 permit command rmdir *
sys-13 permit command pwd
sys-14 permit command rename *
sys-15 permit command undelete *
sys-16 permit command ftp *
sys-17 permit command sftp *
R:Read W:Write X:Execute
Role: guest-manager
Description: Predefined guest manager role can't access to commands
VLAN policy: permit (default)
Interface policy: permit (default)
VPN instance policy: permit (default)
-------------------------------------------------------------------
Rule Perm Type Scope Entity
-------------------------------------------------------------------
sys-1 permit RWX xml-element useraccounts/approveguest/
sys-2 permit RWX xml-element useraccounts/exportguestaccount/
sys-3 permit RWX xml-element useraccounts/generateguestaccoun
t/
sys-4 permit RWX xml-element useraccounts/guest/
sys-5 permit RWX xml-element useraccounts/guestconfigure/
sys-6 permit RWX xml-element useraccounts/importguestaccount/
sys-7 permit RWX xml-element useraccounts/exportguesttemplet/
sys-8 permit RWX xml-element rpc/
sys-9 deny command *
R:Read W:Write X:Execute
(0)
用户角色名 |
权限 |
network-admin |
可操作系统所有功能和资源(除安全日志文件管理相关命令display security-logfile summary、info-center security-logfile directory、security-logfile save之外) |
network-operator |
· 可执行系统所有功能和资源的相关display命令(除display history-command all、display security-logfile summary等命令,具体请通过display role命令查看) · 如果用户采用本地认证方式登录系统并被授予该角色,则可以修改自己的密码 · 可执行进入XML视图的命令 · 可允许用户操作所有读类型的XML元素 · 可允许用户操作所有读类型的OID |
level-n (n = 0~15) |
· level-0:可执行命令ping、tracert、ssh2、telnet和super,且管理员可以为其配置权限 · level-1:具有level-0用户角色的权限,并且可执行系统所有功能和资源的相关display命令(除display history-command all之外),以及管理员可以为其配置权限 · level-2~level-8和level-10~level-14:无缺省权限,需要管理员为其配置权限 · level-9:可操作系统中绝大多数的功能和所有的资源,且管理员可以为其配置权限,但不能操作display history-command all命令、RBAC的命令(Debug命令除外)、文件管理、设备管理以及本地用户特性。对于本地用户,若用户登录系统并被授予该角色,可以修改自己的密码 · level-15:具有与network-admin角色相同的权限 |
security-audit |
安全日志管理员,仅具有安全日志文件的读、写、执行权限,具体如下: · 可执行安全日志文件管理相关的命令(display security-logfile summary、info-center security-logfile directory、security-logfile save)。安全日志文件管理相关命令的介绍,请参见“网络管理与监控”中的“信息中心” · 可执行安全日志文件操作相关的命令,例如more显示安全日志文件内容;dir、mkdir操作安全日志文件目录等,具体命令的介绍请参见“基础配置命令参考”中的“文件系统管理” 以上权限,仅安全日志管理员角色独有,其它任何角色均不具备 该角色不能被授权给从当前用户线登录系统的用户 |
(0)
暂无评论
mdc-admin | 可操作该MDC所有功能和资源(除安全日志文件管理相关命令display security-logfile summary、info-center security-logfile directory、security-logfile save之外),但不包括操作仅缺省MDC支持,非缺省MDC不支持的功能的权限 |
mdc-operator | · 可执行该MDC所有功能和资源的相关display命令(除display history-command all、display security-logfile summary等命令,具体请通过display role命令查看),但不包括仅缺省MDC支持,非缺省MDC不支持的功能的相关display命令的执行权限 · 如果用户采用本地认证方式登录系统并被授予该角色,则可以修改自己的密码 · 可执行进入XML视图的命令 · 可允许用户操作所有读类型的Web菜单选项 · 可允许用户操作所有读类型的XML元素 · 可允许用户操作所有读类型的OID |
level-n (n = 0~15) | · level-0:可执行命令ping、tracert、ssh2、telnet和super,且管理员可以为其配置权限 · level-1:具有level-0用户角色的权限,并且可执行系统所有功能和资源的相关display命令(除display history-command all之外),以及管理员可以为其配置权限 · level-2~level-8和level-10~level-14:无缺省权限,需要管理员为其配置权限 · level-9:可操作系统中绝大多数的功能和所有的资源,且管理员可以为其配置权限,但不能操作display history-command all命令、RBAC的命令(Debug命令除外)、MDC、文件管理、设备管理以及本地用户特性。对于本地用户,若用户登录系统并被授予该角色,可以修改自己的密码 · level-15:在缺省MDC中,具有与network-admin角色相同的权限;在非缺省MDC中,具有与mdc-admin角色相同的权限 |
security-audit | 安全日志管理员,仅具有安全日志文件的读、写、执行权限,具体如下: · 可执行安全日志文件管理相关的命令(display security-logfile summary、info-center security-logfile directory、security-logfile save)。安全日志文件管理相关命令的介绍,请参见“网络管理与监控”中的“信息中心” · 可执行安全日志文件操作相关的命令,例如more显示安全日志文件内容;dir、mkdir操作安全日志文件目录等,具体命令的介绍请参见“基础配置命令参考”中的“文件系统管理” 以上权限,仅安全日志管理员角色独有,其它任何角色均不具备 该角色不能被授权给从当前用户线登录系统的用户 |
guest-manager | 来宾用户管理员,只能查看和配置与来宾有关的web页面,没有控制命令行的权限 |
(0)
暂无评论
亲~登录后才可以操作哦!
确定你的邮箱还未认证,请认证邮箱或绑定手机后进行当前操作
举报
×
侵犯我的权益
×
侵犯了我企业的权益
×
抄袭了我的内容
×
原文链接或出处
诽谤我
×
对根叔社区有害的内容
×
不规范转载
×
举报说明
暂无评论