Cisco Cisco Packet Data Gateway (PDG)
System Settings
▀ Configuring System Administrative Users
▄ ASR 5000 System Administration Guide, StarOS Release 18
64
Configuring Context-level Inspectors
Use the example below to configure context-level inspectors:
configure
context local
inspector user_name { [ encrypted ] [ nopassword ] password password }
end
Notes:
Additional keyword options are available that identify active administrators or place time thresholds on the
administrator. Refer to the Command Line Interface Reference for more information about the inspector
command.
command.
The nopassword option allows you to create an inspector without an associated password. Enable this option
when using ssh public keys (authorized key command in SSH Configuration mode) as a sole means of
authentication. When enabled this option prevents someone from using an inspector password to gain access to
the user account.
authentication. When enabled this option prevents someone from using an inspector password to gain access to
the user account.
Save the configuration as described in the Verifying and Saving Your Configuration chapter.
Verifying Context-level Administrative User Configuration
Verify that the configuration was successful by entering the following command:
show configuration context local
This command displays all of the configuration parameters you modified within the Local context during this session.
The following displays sample output for this command. In this example, a security administrator named testadmin was
configured.
The following displays sample output for this command. In this example, a security administrator named testadmin was
configured.
config
context local
interface mgmt1
ip address 192.168.1.10 255.255.255.0
#exit
subscriber default
#exit
administrator testadmin encrypted password fd01268373c5da85
inspector testinspector encrypted password 148661a0bb12cd59
exit
port ethernet 24/1
bind interface mgmt1 local
exit
end
context local
interface mgmt1
ip address 192.168.1.10 255.255.255.0
#exit
subscriber default
#exit
administrator testadmin encrypted password fd01268373c5da85
inspector testinspector encrypted password 148661a0bb12cd59
exit
port ethernet 24/1
bind interface mgmt1 local
exit
end