564
C
HAPTER
49: P
ASSWORD
C
ONTROL
C
ONFIGURATION
O
PERATIONS
Password Control
Configuration
Example
Network requirements
The following password control functions should be implemented:
■
Globally, the password aging time is 30 days.
■
For the super password, the minimum number of password composition types
is 3 and the minimum number of characters in each composition type is 3.
■
For a local user named test, the minimum password length is 6 characters, the
minimum number of password composition types is 2, the minimum number
of characters in each password composition type is 3, and the password aging
time is 20 days.
Configuration procedure
# Enter system view.
<4210> system-view
# Set the global password aging time to 30 days.
[4210] password-control aging 30
# Set the minimum number of composition types for the super password to 3 and
the minimum number of characters in each composition type to 3.
[4210] password-control super composition type-number 3 type-length 3
# Configure a super password.
[4210] super password level 3 simple 11111AAAAAaaaaa
# Create a local user named test.
[4210] local-user test
# Set the minimum password length for the local user to 6.
[4210-luser-test] password-control length 6
# Set the minimum number of composition types for the local user password to 2
and the minimum number of characters in each password composition type to 3.
[4210-luser-test] password-control composition type-number 2 type-le
ngth 3
Table 418
Displaying password control
Operation
Command
Display the information about the
password control for all users
display password-control
Display the information about the
super password control
display password-control super
Display the information about one
or all users who have been added
to the blacklist because of
password attempt failure
display password-control blacklist
[
user-name
user-name
|
ip
ip-address
]
Summary of Contents for Switch 4210 9-Port
Page 22: ...20 CHAPTER 1 CLI CONFIGURATION ...
Page 74: ...72 CHAPTER 3 CONFIGURATION FILE MANAGEMENT ...
Page 84: ...82 CHAPTER 5 VLAN CONFIGURATION ...
Page 96: ...94 CHAPTER 8 IP PERFORMANCE CONFIGURATION ...
Page 108: ...106 CHAPTER 9 PORT BASIC CONFIGURATION ...
Page 122: ...120 CHAPTER 11 PORT ISOLATION CONFIGURATION ...
Page 140: ...138 CHAPTER 13 MAC ADDRESS TABLE MANAGEMENT ...
Page 234: ...232 CHAPTER 17 802 1X CONFIGURATION ...
Page 246: ...244 CHAPTER 20 AAA OVERVIEW ...
Page 270: ...268 CHAPTER 21 AAA CONFIGURATION ...
Page 292: ...290 CHAPTER 26 DHCP BOOTP CLIENT CONFIGURATION ...
Page 318: ...316 CHAPTER 29 MIRRORING CONFIGURATION ...
Page 340: ...338 CHAPTER 30 CLUSTER ...
Page 362: ...360 CHAPTER 33 SNMP CONFIGURATION ...
Page 368: ...366 CHAPTER 34 RMON CONFIGURATION ...
Page 450: ...448 CHAPTER 39 TFTP CONFIGURATION ...
Page 451: ......
Page 452: ...450 CHAPTER 39 TFTP CONFIGURATION ...
Page 470: ...468 CHAPTER 40 INFORMATION CENTER ...
Page 496: ...494 CHAPTER 44 DEVICE MANAGEMENT ...