HOSTNP Class

Each record in the HOSTNP class defines a group of hosts that have similar host names. HOSTNP records define access rules that govern the access other stations (hosts) that match name pattern in the record have to the local host when using IPv4. For each mask (HOSTNP record), the INETACL property lists the service rules that govern the services that the local host might provide to the group of hosts.
capamsc141
Each record in the HOSTNP class defines a group of hosts that have similar host names. HOSTNP records define access rules that govern the access other stations (hosts) that match name pattern in the record have to the local host when using IPv4. For each mask (HOSTNP record), the INETACL property lists the service rules that govern the services that the local host might provide to the group of hosts.
The key of the HOSTNP class record is the name pattern that is used to filter the host names of the hosts that are protected by this HOSTNP record.
PAM Server Control
access rules for IP communication apply only to IPv4. They do not control IPv6.
The following definitions describe the properties that are contained in this class record. Most properties are modifiable and can be manipulated using selang or the administration interfaces. Non-modifiable properties are marked
informational
.
  • COMMENT
    Defines additional information that you want to include in the record. 
    PAM Server Control
    does not use this information for authorization.
    Limit:
    255 characters
  • CREATE_TIME
    (Informational) Displays the date and time when the record was created.
  • DAYTIME
    Defines the day and time restrictions that govern when an accessor can access a resource.
    Use the restrictions parameter with the chres, ch[x]usr, or ch[x]grp commands to modify this property.
    The resolution of daytime restrictions is one minute.
  • GROUPS
    Defines the list of CONTAINER records that a resource record belongs to.
    To modify this property in a class record, change the MEMBERS property in the appropriate CONTAINER record.
    Use the mem+ or mem- parameter with the chres, editres or newres command to modify this property.
  • INETACL
    Defines the services the local host is allowed to provide to the group of client hosts and what their access types are. Each element in the access control list contains the following information:
    • Services reference
      A reference to a service (a port number or name). To specify all the services, enter an asterisk (*) as the services reference.
      PAM Server Control
      supports dynamic port names as specified in the /etc/rpc file (for UNIX) or \etc\rpc file (for Windows).
    • Access
      Defines the access authority that the accessor has to the resource.
    Use the access(
    type
    -
    of
    -
    access
    ), service, and stationName parameters with the authorize[-] commandto modify accessors and their access types in the INETACL property.
  • INSERVRNGE
    Specifies the range of services that the local host provides to the group of client hosts.
    Performs a similar function to the INETACL property.
    Use the service(
    serviceRange
    ) parameter with the authorize[-] commandto modify accessors and their access types in the INSERVRANGE property.
  • OWNER
    Defines the user or group that owns the record.
  • RAUDIT
    Defines the types of access events that 
    PAM Server Control
    records in the audit log. RAUDIT derives its name from
    R
    esource
    AUDIT
    . Valid values are:
    • all
      All access requests.
    • success
      Granted access requests.
    • failure
      Denied access requests (default).
    • none
      No access requests.
    PAM Server Control
     records events on each attempted access to a resource, and does not record whether the access rules were applied directly to the resource, or were applied to a group or class that had the resource as a member.
    Use the audit parameter of the chres and chfile commands to modify the audit mode.
  • UPDATE_TIME
    (Informational) Displays the date and time when the record was last modified.
  • UPDATE_WHO
    (Informational) Displays the administrator who performed the update.
  • WARNING
    Specifies whether Warning mode is enabled. When Warning mode is enabled on a resource, all access requests to the resource are granted, and if an access request violates an access rule, a record is written to the audit log.
Example: 
Prevent incoming connections to 
PAM Server Control
 endpoint from a restricted remote host, using host name pattern.
Step 1: 
Add remote hosts in /etc/hosts. Run the following command at the command prompt.
vi /etc/hosts
Step 2:
For network interception, the lookahead database "ladb" must be properly entered with the remote host address. To ensure this works, run the following command at the command prompt.
./sebuildla -h
Step 3:
Run the following command at the command prompt to verify that the remote hosts are added to /etc/hosts.
./sebuildla -H
Step 4:
Define remote hosts (using host name pattern) from which we prevent incoming Telnet connections.
PAMSC> nr HOSTNP My_Remote_*
Step 5:
Set a rule that prevents incoming connections from remote hosts using Telnet.
PAMSC> authorize HOSTNP My_Remote_* service(telnet) access(none)
Step 6:
Try connecting from a remote host (with the defined host name pattern) to the
PAM Server Control
endpoint using Telnet. The connection fails but other connections are not affected.
To deny any type of connection from remote hosts, set the following rule.
PAMSC> authorize HOSTNP My_Remote_* service(*) access(none)