Resource protection, Resource protection -5, Remote user privileges -5 – Finisar Surveyor User Manual

Page 93

Advertising
background image

5-5

Resources and Modes

Remote Resources

5

Hovering the mouse over a top-level node which has an alias displays the name
with the IP Address in parenthesis along with the optional comment. For example,
“Chicago Node One (192.1.68.2). This is Mount Prospect node”.

Resource Protection

You are in control of local resources within a PC. Use the functions on the

Host

menu to add and delete users for a resource, change passwords and protections, or
view the users currently logged in. There is a guest account for users with no
account. The guest user can be given all privileges to effectively disable resource
protection.

Note that there is no password protection for starting Surveyor on the local system.
If you can start Surveyor from a system, you automatically have complete access to
all local resources (called super-user privileges).

To access a remote resource, you must have an account and password set up on the
remote system containing the resource or use the guest account.

Privileges for remote users can be set to those described in Table 5-1 below:

Table 5-1. Remote User Privileges

Privilege

Description

Monitor Only

Allows a remote user to use the local device to monitor network activ-
ity only. You can access real-time monitor views on an armed (started)
module, but cannot start/stop a module or define/load a filter.

Capture/Monitor

Allows a remote user to use the local device to monitor activity or cap-
ture network data. You can perform all Monitor Only functions, capture
data, and perform full seven-layer decode on the packets. You can
start/stop a module, define/load a filter, and edit the contents of pack-
ets.

Full

Allows a remote user to use the local device to monitor activity, cap-
ture network data, or transmit network data. You can perform all Cap-
ture/Monitor functions plus all traffic generation capabilities available
through Surveyor.

Super User

Allows a remote user the ability to transmit, capture, or monitor, plus
set up, delete, and change accounts for the local PC. You have Full
access plus the ability to configure a deployed THGs, change the
access table, and unlock any locked module. Be careful when granting
super-user privileges to remote users. This gives remote users com-
plete control of your local resource.

Advertising