Table Of Contents - HP 10500 Series Configuration Manual

Hide thumbs Also See for 10500 Series:
Table of Contents

Advertisement

Contents
Using the CLI ································································································································································ 1
CLI views ············································································································································································ 1
Entering system view from user view ······················································································································ 2
Returning to the upper-level view from any view ·································································································· 2
Returning to user view ·············································································································································· 2
Accessing the CLI online help ·········································································································································· 2
Using the undo form of a command ······························································································································· 3
Entering a command ························································································································································· 4
Editing a command line ··········································································································································· 4
Entering a text or string type value for an argument ···························································································· 4
Abbreviating commands·········································································································································· 5
Configuring and using command keyword aliases ······························································································ 5
Configuring and using command hotkeys ············································································································· 6
Enabling redisplaying entered-but-not-submitted commands ··············································································· 7
Understanding command-line error messages ··············································································································· 7
Using the command history feature ································································································································· 8
Command buffering rules ········································································································································ 8
Controlling the CLI output ················································································································································· 8
Pausing between screens of output ························································································································ 9
Numbering each output line from a display command ······················································································· 9
Filtering the output from a display command ····································································································· 10
Saving the output from a display command to a file ························································································ 12
Viewing and managing the output from a display command effectively ························································ 14
Saving the running configuration ································································································································· 14
Configuring RBAC ······················································································································································ 15
Overview ········································································································································································· 15
Permission assignment ·········································································································································· 15
User role assignment ············································································································································· 18
FIPS compliance ····························································································································································· 18
Configuration task list ···················································································································································· 19
Creating user roles ························································································································································· 19
Configuring user role rules ············································································································································ 19
Configuration restrictions and guidelines ··········································································································· 20
Configuration procedure ······································································································································ 20
Configuring feature groups ··········································································································································· 21
Configuring resource access policies ·························································································································· 22
Configuring the interface policy of a user role ·································································································· 22
Configuring the VLAN policy of a user role ······································································································· 22
Configuring the VPN instance policy of a user role ·························································································· 23
Assigning user roles ······················································································································································· 23
Enabling the default user role feature ················································································································· 23
Assigning user roles to remote AAA authentication users ················································································ 24
Assigning user roles to local AAA authentication users ···················································································· 24
Assigning user roles to non-AAA authentication users on user lines ······························································· 24
Configuring temporary user role authorization ·········································································································· 25
Configuration guidelines ······································································································································ 25
Configuring user role authentication ··················································································································· 27
Obtaining temporary user role authorization ···································································································· 28
i

Advertisement

Table of Contents
loading

Table of Contents