HOSTNET Class
Each record in the HOSTNET class defines a group of hosts on a particular network. HOSTNET records define rules that govern the access other hosts in the group have to the local host when using IPv4 communication.
capamsc141
Each record in the HOSTNET class defines a group of hosts on a particular network. HOSTNET records define rules that govern the access other hosts in the group have to the local host when using IPv4 communication.
Privileged Access Manager
access rules for IP communication apply only to IPv4. They do not control access by IPv6.The INMASKMATCH determines which other hosts are subject to a HOSTNET record. The INETACL property defines which services the local host can provide to those hosts.
The key of the HOSTNET class record is the name of the HOSTNET record.
The following definitions describe the properties that are contained in this class record. Most properties are modifiable and can be manipulated using selang or the administration interfaces. Non-modifiable properties are marked
informational
.- COMMENTDefines additional information that you want to include in the record.Privileged Access Managerdoes not use this information for authorization.Limit:255 characters.
- CREATE_TIME(Informational) Displays the date and time when the record was created.
- DAYTIMEDefines the day and time restrictions that govern when an accessor can access a resource.Use the restrictions parameter with the chres, ch[x]usr, or ch[x]grp commands to modify this property.The resolution of daytime restrictions is one minute.
- GROUPSDefines the list of CONTAINER records that a resource record belongs to.To modify this property in a class record, change the MEMBERS property in the appropriate CONTAINER record.Use the mem+ or mem- parameter with the chres, editres or newres command to modify this property.
- INETACLDefines the services that the local host is allowed to provide to the group of client hosts and what their access types are. Each element in the access control list contains the following information:
- Services referenceA reference to a service (a port number or name). To specify all the services, enter an asterisk (*) as the services reference.Privileged Access Managersupports dynamic port names as specified in the /etc/rpc file (for UNIX) or \etc\rpc file (for Windows).
- AccessDefines the access authority that the accessor has to the resource.
type-of-access), service, and stationName parameters with the authorize[-] commandto modify accessors and their access types in the INETACL property. - INSERVRNGESpecifies the range of services that the local host provides to the group of client hosts.Performs a similar function to the INETACL property.Use the service(serviceRange) parameter with the authorize[-] commandto modify accessors and their access types in the INSERVRANGE property.
- INMASKMATCHDefines the group of hosts to which this HOSTNET record applies. The property contains mask and match values, which are applied to the IP address of the requesting host to determine whether the requesting host belongs to the group.The INMASKMATCH property only supports addresses that are in IPv4 format .This property corresponds to the mask and match parameters of the chres command.
- OWNERDefines the user or group that owns the record.
- RAUDITDefines the types of access events thatPrivileged Access Managerrecords in the audit log. RAUDIT derives its name fromResourceAUDIT. Valid values are:
- allAll access requests.
- successGranted access requests.
- failureDenied access requests (default).
- noneNo access requests.
Privileged Access Managerrecords events on each attempted access to a resource, and does not record whether the access rules were applied directly to the resource, or were applied to a group or class that had the resource as a member.Use the audit parameter of the chres and chfile commands to modify the audit mode. - UPDATE_TIME(Informational) Displays the date and time when the record was last modified.
- UPDATE_WHO(Informational) Displays the administrator who performed the update.
- WARNINGSpecifies whether Warning mode is enabled. When Warning mode is enabled on a resource, all access requests to the resource are granted, and if an access request violates an access rule, a record is written to the audit log.
Example:
Prevent incoming connections to Privileged Access Manager
endpoint from remote hosts in a given subnet.Step 1:
Add remote hosts in /etc/hosts. Run the following command at the command prompt.vi /etc/hosts
Step 2:
For network interception, the lookahead database "ladb" must be properly entered with the remote host address. To ensure this works, run the following command at the command prompt../sebuildla -h
Step 3:
Run the following command at the command prompt to verify that the remote hosts are added to /etc/hosts../sebuildla -H
Step 4:
Create the given rule. Assume 'engineering' defines the group of hosts in the subnet (10.131.33) belonging to engineering department. As per the rule, all incoming connections from IP addresses (10.131.33.*) are considered using the 'Mask' value.PAMSC> nr HOSTNET engineering mask(255.255.255.0) match(10.131.33.0)
Step 5:
Set a rule that prevents incoming connections from remote hosts in a given subnet using Telnet.PAMSC> authorize HOSTNET engineering service(telnet) access(none)
Step 6:
Try connecting from the remote host (within the subnet) to the Privileged Access Manager
endpoint using Telnet. The connection fails but other connections are not affected.To deny any type of connection from a remote host within a given subnet, set the following rule.
PAMSC> authorize HOSTNET engineering service(*) access(none)