Command Line | Select the type of role for CLI access.
The default is None, which means access to
the CLI is not permitted. The other options vary by Role scope: Device superuser—Has
full access to the firewall and can define new administrator accounts and
virtual systems. You must have superuser privileges to create an
administrative user with superuser privileges. superreader—Has read-only access to
the firewall. deviceadmin—Has full access to all
firewall settings except for defining new accounts or virtual systems. devicereader—Has read-only access
to all firewall settings except password profiles (no access) and
administrator accounts (only the logged in account is visible).
Virtual System vsysadmin—Has access
to specific virtual systems on the firewall to create and manage
specific aspects of virtual systems. The vsysadmin setting
doesn’t control firewall-level or network-level functions (such
as static and dynamic routing, IP addresses of interfaces, IPSec
tunnels, VLANs, virtual wires, virtual routers, logical routers,
GRE tunnels, DHCP, DNS Proxy, QoS, LLDP, or network profiles). vsysreader—Has read-only access to
specific virtual systems on the firewall and specific aspects of
a virtual system. The vsysreader setting
doesn’t have access to firewall-level or network-level functions
(such as static and dynamic routing, IP addresses of interfaces,
IPSec tunnels, VLANs, virtual wires, virtual routers, logical routers,
GRE tunnels, DHCP, DNS Proxy, QoS, LLDP, or network profiles).
|