66
C
HAPTER
4: M
ANAGING
U
SER
P
ASSWORDS
Only one unsuccessful login attempt is allowed in a 10-second
period for a
user or session.
All administrative logins, logouts, logouts due to idle timeout, and
disconnects are logged.
The audit log file on the WX switch (
command_audit.cur
) cannot
be deleted,
and attempts to delete log files are recorded.
These restrictions are disabled by default.
Configuring
Passwords
This section describes the following tasks:
Setting a password for a user in the local database
Enabling restrictions on password usage
Setting the maximum number of failed login attempts for a user
Specifying the minimum allowable password length
Setting the length of time before password expiration
Restoring access to a user that has been locked out of the system
Setting Passwords for
Local Users
To configure a user’s password in the local database, type the following
command:
set user
username
password
[
encrypted
]
password
For example, to configure user Jose with the password
spRin9
in the local
database on the WX, type the following command:
WX# set user Jose password spRin9
success: User Jose created
The
encrypted
option indicates that the password string you are
entering is the encrypted form of the password. Use this option only if
you do not want MSS to encrypt the password for you.
By default, usernames and passwords in the local database are not
case-sensitive; passwords can be made case-sensitive by activating
password restrictions, as described in the following section.
To clear a user from the local database, type the following command:
clear user
username
Summary of Contents for 3CRWX120695A
Page 138: ...138 CHAPTER 6 CONFIGURING AND MANAGING IP INTERFACES AND SERVICES ...
Page 272: ...272 CHAPTER 11 CONFIGURING RF LOAD BALANCING FOR MAPS ...
Page 310: ...310 CHAPTER 13 CONFIGURING USER ENCRYPTION ...
Page 322: ...322 CHAPTER 14 CONFIGURING RF AUTO TUNING ...
Page 350: ...350 CHAPTER 16 CONFIGURING QUALITY OF SERVICE ...
Page 368: ...368 CHAPTER 17 CONFIGURING AND MANAGING SPANNING TREE PROTOCOL ...
Page 412: ...412 CHAPTER 19 CONFIGURING AND MANAGING SECURITY ACLS ...
Page 518: ...518 CHAPTER 21 CONFIGURING AAA FOR NETWORK USERS ...
Page 530: ...530 CHAPTER 22 CONFIGURING COMMUNICATION WITH RADIUS ...
Page 542: ...542 CHAPTER 23 MANAGING 802 1X ON THE WX SWITCH ...
Page 598: ...598 CHAPTER 26 ROGUE DETECTION AND COUNTERMEASURES ...
Page 706: ...706 GLOSSARY ...