Use the set auth command to
The set auth command is a very powerful tool for limiting outbound call access to device/terminal server ports. There are, however, a few rules you must understand in order to use this command to produce the configuration results you intend:
The auth table is limited to 20 entries.
Anyone can use the set auth command to display auth table entries. Root privileges are required to configure access permissions or to remove entries from the auth table.
Enter the set auth command as shown below to configure auth table entries.
set auth [ip=ip_addr] [mask=ip_mask]
[login=none|range] [range=range]
[realport=none|range] [unrestricted=none|range]
[rmauth=ip_addr|on]
Enter the set auth command as shown below to display auth table entries.
set auth [range=range]
Enter the set auth command as shown below to delete entries from the auth table.
set auth range=range rmauth=on
|
Command Field |
Description |
|
ip |
Specifies the IP address of the device to which this set auth command applies. |
|
login |
Configures login requirements to the range of ports specified for the IP address specified. Users with other IP addresses continue to have unrestricted access to these ports. |
|
mask |
Specifies an IP mask used to extend the scope of this set auth command to a range of IP addresses. See the examples that follow for more information on using the ip and mask fields together. |
|
range |
Specifies one of the following:
|
|
realport |
Configures access for the RealPort drivers running on the devices identified by the ip and mask fields to the specified range of ports The default is that RealPort can access a port. Unless you use the set auth command to configure a port to restrict RealPort access, RealPort drivers can access that port. |
|
unrestricted |
Configures unrestricted access for the IP address specified to the range of ports specified. |
|
rmauth |
on - makes the command apply to the auth table entries defined in the range field. |
In this example, the set auth command displays the entire auth table.
set auth
In this example, the set auth command displays a range of auth table entries.
set auth range=1-8
In this example of a TCP/IP Class C network, the set auth command configures
set auth ip=199.150.150.10 mask=255.255.255.0 realport=1-8
unrestricted=1-8
set auth ip=199.150.150.10 mask=255.255.255.0 realport=1-8
unrestricted=1-8
In this example, the set auth command configures
set auth ip=199.150.150.16 mask=0.0.0.0
unrestricted=1
set auth ip=199.150.150.16 mask=0.0.0.0
unrestricted=1
In this example, the set auth command configures
set auth range=2-4 ip=199.150.150.16 login=2-3
unrestricted=4-5
set auth range=2-4 ip=199.150.150.16 login=2-3
unrestricted=4-5
In this example, the set auth command removes an entry from the auth table by specifying an IP address.
set auth ip=199.150.150.16 rmauth=on
In this example, the set auth command removes an entry by specifying a range of entries in the auth table.
set auth rmauth=on range=1-2