Command Line Interface Commands
41
Login users are classified into four levels that correspond to the four command
levels respectively. After users of different levels log in, they can only use
commands at the levels that are equal to or lower than its own level.
Related command:
super password
,
quit
.
Example
# change to user level 3 from the current user level.
<SW8800> super 3
Password:
super password
Syntax
super password
[
level
level
] {
simple
|
cipher
}
password
undo super password
[
level
level
]
View
System view
Parameter
level
: Specifies the entering password of the specified priority, ranging from 1 to 3.
The default value is 3, i.e. do not specify user level. It means the password to be
set is used for entering level 3.
simple
: Displays the current password with plain text.
cipher
: Displays the current password with cipher text.
password
: If the authentication is in the
simple
mode, the password must be in
plain text. If the authentication is in the
cipher
mode, the password can either be
in encrypted text or in plain text. The result is determined by the input. A plain text
password is a sequential character string of no more than 16 digits, for example,
3com918. The length of an encrypted password must be 24 digits and in
encrypted text, for example, _(TT8F]Y5SQ=^Q‘MAF4<1!!.
Description
Use the
super password
command to configure the password for changing the
user from a lower level to a higher level. In order to prevent unauthorized users
from illegal intrusion, user ID authentication is performed when users switch from
a lower level to a higher level. For the sake of confidentiality, on the screen the
user cannot see the password that he entered. Only when correct password is
input for three times, can the user switch to the higher level. Otherwise, the
original user level will remain unchanged. Use the
undo super password
command to cancel the current settings.
The password in plain text is required when performing authentication, regardless
whether the configuration is plain text or encrypted text.
Example
# Configure the password to zbr for changing the user from the current level to
level 3.
Summary of Contents for Switch 8807
Page 30: ......
Page 68: ...66 CHAPTER 2 COMMANDS USED TO LOG IN TO SWITCH ...
Page 78: ...76 CHAPTER 3 CONFIGURATION FILE MANAGEMENT COMMANDS ...
Page 96: ...94 CHAPTER 5 SUPER VLAN CONFIGURATION COMMANDS ...
Page 122: ...120 CHAPTER 8 IP PERFORMANCE CONFIGURATION COMMANDS ...
Page 130: ...128 CHAPTER 9 GARP GVRP CONFIGURATION COMMANDS ...
Page 162: ...160 CHAPTER 11 ETHERNET LINK AGGREGATION CONFIGURATION COMMANDS ...
Page 212: ...210 CHAPTER 13 MSTP CONFIGURATION COMMANDS ...
Page 234: ...232 CHAPTER 16 ACL COMMANDS ...
Page 282: ...280 CHAPTER 18 ACL CONTROL COMMANDS TO CONTROL LOGIN USERS ...
Page 293: ......
Page 294: ...292 CHAPTER 19 VLAN ACL CONFIGURATION COMMANDS ...
Page 310: ...308 CHAPTER 20 802 1X CONFIGURATION COMMANDS ...
Page 370: ...368 CHAPTER 21 AAA AND RADIUS HWTACACS PROTOCOL CONFIGURATION COMMANDS ...
Page 398: ...396 CHAPTER 23 STATIC ROUTE CONFIGURATION COMMANDS ...
Page 462: ...460 CHAPTER 25 OSPF CONFIGURATION COMMANDS ...
Page 498: ...496 CHAPTER 26 INTEGRATED IS IS CONFIGURATION COMMANDS ...
Page 548: ...546 CHAPTER 27 BGP CONFIGURATION COMMANDS ...
Page 570: ...568 CHAPTER 30 RECURSIVE ROUTING CONFIGURATION ...
Page 584: ...582 CHAPTER 32 MULTICAST VLAN CONFIGURATION COMMANDS ...
Page 600: ...598 CHAPTER 33 MULTICAST COMMON CONFIGURATION COMMANDS ...
Page 604: ...602 CHAPTER 34 STATIC MULTICAST MAC ADDRESS CONFIGURATION COMMAND ...
Page 656: ...654 CHAPTER 37 MSDP CONFIGURATION COMMANDS ...
Page 682: ...680 CHAPTER 38 MBGP MULTICAST EXTENSION CONFIGURATION COMMANDS ...
Page 762: ...760 CHAPTER 40 BGP MPLS VPN CONFIGURATION COMMANDS ...
Page 808: ...806 CHAPTER 44 HA CONFIGURATION COMMANDS_HA_CONFIGURATION ...
Page 820: ...818 CHAPTER 45 ARP CONFIGURATION COMMANDS ...
Page 824: ...822 CHAPTER 46 ARP TABLE SIZE CONFIGURATION COMMANDS max arp entry config of slot 13 8192 ...
Page 862: ...860 CHAPTER 47 DHCP CONFIGURATION COMMANDS ...
Page 870: ...868 CHAPTER 48 DNS CONFIGURATION COMMANDS ...
Page 972: ...970 CHAPTER 56 SSH TERMINAL SERVICE CONFIGURATION COMMANDS ...
Page 982: ...980 CHAPTER 57 FILE SYSTEM MANAGEMENT COMMANDS ...
Page 1026: ...1024 CHAPTER 60 INFORMATION CENTER ...
Page 1046: ...1044 CHAPTER 63 PORT PACKET STATISTICS COMMANDS ...
Page 1051: ...Ethernet Port Detection Configuration Commands 1049 ...
Page 1052: ...1050 CHAPTER 64 PORT LOOPBACK DETECTION COMMANDS ...
Page 1053: ...Ethernet Port Detection Configuration Commands 1051 ...
Page 1054: ...1052 CHAPTER 64 PORT LOOPBACK DETECTION COMMANDS ...
Page 1055: ......
Page 1056: ...1054 CHAPTER 64 PORT LOOPBACK DETECTION COMMANDS ...
Page 1057: ......
Page 1058: ...1056 CHAPTER 64 PORT LOOPBACK DETECTION COMMANDS ...
Page 1059: ...Ethernet Port Detection Configuration Commands 1057 ...
Page 1060: ...1058 CHAPTER 64 PORT LOOPBACK DETECTION COMMANDS ...
Page 1061: ......
Page 1062: ...1060 CHAPTER 64 PORT LOOPBACK DETECTION COMMANDS ...
Page 1063: ...Ethernet Port Detection Configuration Commands 1061 ...
Page 1064: ...1062 CHAPTER 64 PORT LOOPBACK DETECTION COMMANDS ...
Page 1065: ......
Page 1066: ...1064 CHAPTER 64 PORT LOOPBACK DETECTION COMMANDS ...
Page 1090: ...1088 CHAPTER 66 NQA CONFIGURATION COMMANDS ...