Cisco Cisco Prime Network Registrar 8.1 User Guide
Understanding the System Tab
Administrator Roles 27
type policy rules are examined. If a user owns multiple administrator roles, the block type size
constraints defined for the
least restrictive role will be used.
3.8.2.6
Block Type Definition Rules
The block type will be allowed block allocation for the block size if there are no constraints
defined for the block size. Note if the block size is defined as not allowable by the block type
definition, then the user will not be allowed allocation
regardless of the constraints defined at
any administrator role level.
3.8.2.7
Administrator Block Type Policy Rules
The block type will be allowable for allocation for the block size if any of the following
conditions apply:
•
The block type is
not selected as “Limit Access By Selected Block Type(s)”.
•
The block type
is selected as “Limit Access By Selected Block Type(s)” and the block
size is defined as allowable for the block type.
Note: If “Limit Access By Selected Block Type(s)” is selected and “Abstain and leave block
sizes ‘undefined’” is flagged, the administrator role will defer to another role owned by the
administrator. If in a case where there are no other roles defined, the block type definition
rules will be used.
3.8.2.8
Device Type Access Controls
This tab allows you to limit the
Device Types that this administrator can manage. It limits
the device types available on the Add IP Address, or the Add IP Address Range screens. The
net effect is that by limiting device types for an administrator, they can view devices of any
type, but can only create, edit, or delete devices of types for which they have permissions.
To enable Device Type Access Controls for an administrator, click the
To enable Device Type Access Controls for an administrator, click the
Device Type Access
tab. Select the
Enable All Device Types check box. If you wish to limit access by selected
device type, choose the stated radio button and select the individual device types where access
is desired.
3.8.2.9
Administrator Policies
This tab allows you to assign miscellaneous administrator policies to this role.
Table 3-10 Administrator Policies Parameters
Field
Description
Allow Command Line
Interface Access for this
Administrator
When checked, this administrator is permitted to use Command Line
Interfaces to Cisco Prime Network Registrar IPAM. Otherwise, this
administrator is denied access to the Command Line Interfaces.
Allow Duplicate Hostnames
Checking
Ignore – Ignores duplicate hostname checking for this administrator.
Warn – When a duplicate hostname is encountered, provides a warning to this
administrator.
Fail - Does not allow this administrator to add duplicate hostnames.
Fail - Does not allow this administrator to add duplicate hostnames.
Duplicate Hostname
Fully Qualified Domain Name – Allows administrator to check for