HOSTNP Class
Each record in the HOSTNP class defines a group of hosts that have similar host names. HOSTNP records define access rules that govern the access other stations (hosts) that match name pattern in the record have to the local host when using IPv4. For each mask (HOSTNP record), the INETACL property lists the service rules that govern the services that the local host might provide to the group of hosts.
capamsc141
Each record in the HOSTNP class defines a group of hosts that have similar host names. HOSTNP records define access rules that govern the access other stations (hosts) that match name pattern in the record have to the local host when using IPv4. For each mask (HOSTNP record), the INETACL property lists the service rules that govern the services that the local host might provide to the group of hosts.
The key of the HOSTNP class record is the name pattern that is used to filter the host names of the hosts that are protected by this HOSTNP record.
PAM Server Control
access rules for IP communication apply only to IPv4. They do not control IPv6.The following definitions describe the properties that are contained in this class record. Most properties are modifiable and can be manipulated using selang or the administration interfaces. Non-modifiable properties are marked
informational
.- COMMENTDefines additional information that you want to include in the record.PAM Server Controldoes not use this information for authorization.Limit:255 characters
- CREATE_TIME(Informational) Displays the date and time when the record was created.
- DAYTIMEDefines the day and time restrictions that govern when an accessor can access a resource.Use the restrictions parameter with the chres, ch[x]usr, or ch[x]grp commands to modify this property.The resolution of daytime restrictions is one minute.
- GROUPSDefines the list of CONTAINER records that a resource record belongs to.To modify this property in a class record, change the MEMBERS property in the appropriate CONTAINER record.Use the mem+ or mem- parameter with the chres, editres or newres command to modify this property.
- INETACLDefines the services the local host is allowed to provide to the group of client hosts and what their access types are. Each element in the access control list contains the following information:
- Services referenceA reference to a service (a port number or name). To specify all the services, enter an asterisk (*) as the services reference.PAM Server Controlsupports dynamic port names as specified in the /etc/rpc file (for UNIX) or \etc\rpc file (for Windows).
- AccessDefines the access authority that the accessor has to the resource.
type-of-access), service, and stationName parameters with the authorize[-] commandto modify accessors and their access types in the INETACL property. - INSERVRNGESpecifies the range of services that the local host provides to the group of client hosts.Performs a similar function to the INETACL property.Use the service(serviceRange) parameter with the authorize[-] commandto modify accessors and their access types in the INSERVRANGE property.
- OWNERDefines the user or group that owns the record.
- RAUDITDefines the types of access events thatPAM Server Controlrecords in the audit log. RAUDIT derives its name fromResourceAUDIT. Valid values are:
- allAll access requests.
- successGranted access requests.
- failureDenied access requests (default).
- noneNo access requests.
PAM Server Controlrecords events on each attempted access to a resource, and does not record whether the access rules were applied directly to the resource, or were applied to a group or class that had the resource as a member.Use the audit parameter of the chres and chfile commands to modify the audit mode. - UPDATE_TIME(Informational) Displays the date and time when the record was last modified.
- UPDATE_WHO(Informational) Displays the administrator who performed the update.
- WARNINGSpecifies whether Warning mode is enabled. When Warning mode is enabled on a resource, all access requests to the resource are granted, and if an access request violates an access rule, a record is written to the audit log.
Example:
Prevent incoming connections to PAM Server Control
endpoint from a restricted remote host, using host name pattern.Step 1:
Add remote hosts in /etc/hosts. Run the following command at the command prompt.vi /etc/hosts
Step 2:
For network interception, the lookahead database "ladb" must be properly entered with the remote host address. To ensure this works, run the following command at the command prompt../sebuildla -h
Step 3:
Run the following command at the command prompt to verify that the remote hosts are added to /etc/hosts../sebuildla -H
Step 4:
Define remote hosts (using host name pattern) from which we prevent incoming Telnet connections.PAMSC> nr HOSTNP My_Remote_*
Step 5:
Set a rule that prevents incoming connections from remote hosts using Telnet.PAMSC> authorize HOSTNP My_Remote_* service(telnet) access(none)
Step 6:
Try connecting from a remote host (with the defined host name pattern) to the PAM Server Control
endpoint using Telnet. The connection fails but other connections are not affected.To deny any type of connection from remote hosts, set the following rule.
PAMSC> authorize HOSTNP My_Remote_* service(*) access(none)