Introduction › Access Security
Access Security
You can use the internal security mechanism to control network access. During the installation process, the following users can be defined:
- Those privileged to execute all commands
- Those privileged to execute display commands only
Copyright © 2010 CA.
All rights reserved.