1-14
By default, when users telnet to the device, they can only use the following commands after passing the
authentication:
<Sysname> ?
User view commands:
cluster Run cluster command
display Display current system information
ping Ping function
quit Exit from current command view
ssh2 Establish a secure shell client connection
super Set the current user priority level
telnet Establish one TELNET connection
tracert Trace route function
After you set the user privilege level under the user interface, users can log in to the device through
Telnet without any authentication and use the following commands:
<Sysname> ?
User view commands:
cluster Run cluster command
debugging Enable system debugging functions
display Display current system information
ipc Interprocess communication
ping Ping function
quit Exit from current command view
refresh Do soft reset
reset Reset operation
screen-length Specify the lines displayed on one screen
send Send information to other user terminal interface
ssh2 Establish a secure shell client connection
super Set the current user priority level
telnet Establish one TELNET connection
terminal Set the terminal line characteristics
tracert Trace route function
undo Cancel current setting
z
Authenticate the usesr logging in to the device through Telnet, verify their passwords, and specify
the user privilege levels as 2.
<Sysname> system-view
[Sysname] user-interface vty 0 4
[Sysname-ui-vty0-4] authentication-mode password
[Sysname-ui-vty0-4] set authentication password cipher 123
[Sysname-ui-vty0-4] user privilege level 2
By default, when users log in to the device through Telnet, they can use the commands of level 0 after
passing the authentication. After you set the user privilege level under the user interface, when users
log in to the device through Telnet, they need to input password
123
, and then they can use commands
of levels 0, 1, and 2.