Appendix K Router Platform User Interface Reference

 

 

HTTP Policy Page

 

Table K-50

HTTP Page—AAA Tab (Continued)

 

 

Prioritized Method List

Applies only when the Enable CLI/EXEC Operations Authorization check

 

 

box is selected.

 

 

Defines a sequential list of methods to be queried when authorizing a user to

 

 

open an EXEC (CLI) session. Enter the names of one or more AAA server

 

 

group objects (up to four), or click Select to display an Object Selectors,

 

 

page F-593. Use the up and down arrows in the object selector to define the

 

 

order in which the selected server groups should be used.

 

 

The device tries initially to authorize users using the first method in the list.

 

 

If that method fails to respond, the device tries the next method, and so on,

 

 

until a response is received.

 

 

If the AAA server group you want is not listed, click the Create button in the

 

 

selector to display the AAA Server Group Dialog Box, page F-12. From here

 

 

you can define a AAA server group object.

 

 

Note If you select None as a method, it must appear as the last method in

 

 

the list.

 

 

Command Authorization settings

 

 

 

Filter

 

Enables you to filter the information displayed in the table. For more

 

 

information, see Filtering Tables, page 3-24.

 

 

 

Privilege Level

 

The privilege level to which the command authorization definition applies.

 

 

Prioritized Method List

The method list to use when authorizing users with this privilege level.

 

 

 

Add button

 

Opens the Command Authorization Override Dialog Box, page K-116. From

 

 

here you can configure a command authorization definition.

 

 

 

Edit button

 

Opens the Command Authorization Override Dialog Box, page K-116. From

 

 

here you can edit the command authorization definition.

 

 

 

Delete button

 

Deletes the selected command authorization definitions from the table.

 

 

 

HTTP Page button

 

 

 

 

 

Save button

 

Saves your changes to the Security Manager server but keeps them private.

 

 

Note To publish your changes, click the Submit button on the toolbar.

 

 

 

 

 

 

User Guide for Cisco Security Manager 3.2

 

 

 

 

 

 

OL-16066-01

 

 

K-115

 

 

 

Page 115
Image 115
Cisco Systems OL-16066-01 appendix Information, see Filtering Tables, 115