Q Interface Access: This option is used to set the Interface for Access. This configuration item also provides two options: Allow all and deny all and allow. The two options have the same meaning as the options in Host Access, except that the Host interface is allowed and denied, rather than the IP address. Among them, Linux interfaces are usually eth0, eth1... and so on.
The user information created in this example, as shown in Figure 1.9.
Figure 1.9 new user information
(4) you can see from this interface that a User named bob is created and the User role is User. Then, Click Create User to display the page shown in 1.10.
Figure 1.10 new user information
(5) This interface displays information about the newly created user bob, such as the role, access permission, ID, Creation Time, and modification time. Click the rightmost icon on the page to return to the user interface. The newly added user is displayed, as shown in Figure 1.11.
Fig 1.11 user interface
(6) you can see that a user named bob is added to the list. On this page, you can select the buttons in Actions to delete, edit, clone, and export the user information as XML. For example, when cloning a bob user, click the (icon) icon to clone the bob user. The interface shown in 1.12 is displayed.
Figure 1.12 cloned user information
(7) The cloned user name is bob_Clone_1. If you want to modify the user's settings, click the (edit) icon to display the interface shown in 1.13.
Figure 1.13 edit user information
(8) The interface displays the basic information of the cloned user. In this case, you can reset the user's name, password, role, group, and permissions. For example, modify the user name to alice. Then, click Save User to Save the settings. The page shown in 1.14 is displayed.
Figure 1.14 cloned alice user information
(9) Next, return to the user interface and you will see three users, as shown in Figure 1.15.
Fig 1.15 user interface
(10) you can see the newly created users bob and alice. To delete a user, click the icon.
This article is selected from: OpenVAS basic vulnerability scan tutorial Ba internal information, reprinted please indicate the source, respect technology respect it people!
?
Copyright Disclaimer: This article is an original article by the blogger and cannot be reproduced without the permission of the blogger.