User |
This is the login name. Range: 0 to 255 |
Password |
This is the user password. Range: 0 to 255 |
Command |
This is the command, which is started at login, e.g. sh, telnet. All external commands are possible. Variable got replaced by biboAdmLoginSnmpShellCommand. Range: 0 to 255 |
State |
The variable is used to disable or discard the entry. Enumerations: - valid (1)
- delete (2)
- invalid (3)
|
SnmpShellCommand |
This is the command, which is started upon shell login; examples are 'telnet <IPaddr>', 'ifstat' or 'ps -ef'. All external commands are possible, SNMP as well as all other internal commands can be emulated via: sh -c '<cmd>[;<cmd> ... ]' Obsoletes biboAdmLoginCommand. Range: 0 to 255 |
SNMPAccessLevel |
Define SNMP access level for account. Available access levels are: no-access(1), read(2), write(3), admin(4) They match SNMP communities but for value no-access which disables SNMP access for that account. Default value is no-access in order to avoid unintentionally granting access rights. Enumerations: - no-access (1)
- read (2)
- write (3)
- admin (4)
|
ShellAccessLevel |
Define Shell access level for account. Available access levels are 0 and 1, basically switching shell access off or on, respectively. Default value is 0 in order to avoid unintentionally granting access rights. Range: 0 to 1 |
HTTPAccessRights |
Define HTTP access rights for account which are defined as bit field. Available access right bits are currently: bit 0: admin - access to any and all pages bit 1: fci - access to funkwerk configuration interface bit 2: maint - access to system maintenance pages (update of images, import and export of configurations and the like) bit 3: easp - access to pages dedicated for use by external applications (currently only Dime Manager) If bit 0 (admin) is set, all other bit values are ignored and assumed as set (i.e. access allowed). This allows for defining unrestricted access in a forward-compatible manner even when new bits should be introduced. A value of 0 turns HTTP access off completely. Other values grant HTTP access in an application dependent manner; each value may be interpreted differently on different products. Default value is 0 in order to avoid unintentionally granting access rights. Enumerations: - admin (0)
- fci (1)
- maint (2)
- easp (3)
|
GUIAccessLevel |
Define GUI access level for account. Available access levels reach from 0 to 255. Value 0 turns GUI access off, value 1 defines allmighty administrator role. Other values grant GUI access in an application dependend manner; each value may be interpreted differently on different products. Default value is 0 in order to avoid unintentinoally granting access rights. Range: 0 to 255 |
ActivityMonAccessLevel |
Define activitiy monitor access level for account. Value 0 inhibits any means of influencing system by activity monitor mechanisms. Value 1 grants full access. NOTE: This variable is currently only valid for special users admin and write (SNMP communities). For all other users it is ignored. Default value is 0 in order to avoid unintentinoally granting access rights. Range: 0 to 1 |
ApDiscAccessLevel |
Define access level for access point discovery instances. Value 0 inhibits any means of influencing system by access point discovery mechanisms. Value 1 grants full access. NOTE: This variable is currently only valid for special user admin (SNMP community). For all other users it is ignored. Default value is 0. Range: 0 to 1 |
HTTPAccessClass |
Define SNMP access class for account. Available access levels are: user(1), admin(2), HTTP access class allows HTTP sessions to be classified and realize limitation of HTTP sessions while allowing for prioritizing sessions over user sessions. This ensures manageability of the system even if normal users flood system with their requests. Default value is user. Enumerations: |