Specifications

Using Access Server Commands
1-2
Online Help
Introduction
You can display brief descriptions of all access server commands and
characteristics available for the security level of your port by typing HELP at the
access server prompt. The access server also offers tutorial help, which describes
various end-user tasks.
User Security Levels
Three levels of security are available for access server ports:
Privileged status
— The user at a privileged port has access to the entire access
server command set, including commands that manage the access server, its
ports, its sessions, and its services.
Any user who knows the privileged password can set a port’s status to
privileged with the SET PRIVILEGED command. For security reasons, an
access server usually has only one privileged user—the person managing the
access server.
Nonprivileged status
— Nonprivileged status is the default for all interactive
ports. Users at a nonprivileged port cannot access commands that change the
state of the access server or other ports, but they can use all commands
required for connecting to LAT services, Internet hosts, and network
connections from an interactive port.
Nonprivileged users can also modify certain port characteristics and display
information about the access server, its ports, and service nodes. Chapter 2
identifies the commands available to nonprivileged users.
Secure status
— Secure status restricts the commands that are available on a
port to a subset of the nonprivileged commands. This subset includes
commands that are required for connecting to LAT services and Internet hosts
from that particular port. Secure users have access to only limited display
information and cannot use the broadcast feature that is available to
nonprivileged users. Also, secure users cannot use CHANGE and DEFINE
commands (only the SET keyword is valid).
Chapter 2 identifies all the commands that you can enter from a secure port by the
designation “available to all users.” To view all secure commands, SET PORT
SECURITY ENABLED and then access online help. The commands listed will be
those available to secure users.