AT-9000 Switch Command Line User’s Guide
Section XI: Management Security
1093
Command Mode
Restriction
Command mode restriction allows you to enhance the security of the
manager accounts by requiring that managers who have the privilege level
15 enter a special password to move from the User Exec mode to the
Privileged Exec mode. Managers who do not know the special password
are restricted to the User Exec mode, just as if their accounts had the
privilege level 1.
When command mode restriction is active on the switch, managers are
prompted for the special password when they enter the ENABLE
command to move from the User Exec mode to the Privilege Exec mode.
The prompt is shown in Figure 175.
Figure 175. Password Prompt for Command Mode Restriction
If the manager enters the correct password, the Privileged Exec mode
prompt is displayed. If the wrong password or no password is entered, the
manager remains in the User Exec mode.
The command for activating command mode restriction and defining the
special password is the ENABLE PASSWORD command, in the Global
Configuration mode. For instructions on how to use the command, refer to
“Activating Command Mode Restriction and Creating the Special
Password” on page 1097.
Command mode restriction does not apply to manager accounts with the
privilege level 1. Manager accounts with that privilege level are always
restricted to the User Exec mode.
Password
Encryption
When you create a new manager account, you have to assign it a
password. You also have to create a new password if you activate
command mode restrictions. The commands for creating manager
accounts and activating command mode restriction give you the choice of
entering new passwords in either plaintext or encrypted form. Password
that are entered in plaintext are stored by the switch in either plaintext or
encrypted form in the running configuration and the active boot
configuration file, depending on the password encryption setting. If
password encryption is enabled, the default setting, plaintext passwords
are stored in encrypted form. If password encryption is disabled, plaintext
passwords are stored in plaintext.
awplus Login: adams
Password: ********
awplus> enable
Password:
Summary of Contents for AT-9000/28
Page 4: ......
Page 26: ...Contents 26...
Page 30: ...Tables 30...
Page 36: ...36 Section I Getting Started...
Page 70: ...Chapter 2 Starting a Management Session 70 Section I Getting Started...
Page 96: ...96 Section II Basic Operations...
Page 142: ...Chapter 6 Basic Switch Management Commands 142 Section II Basic Operations...
Page 220: ...Chapter 9 IPv4 and IPv6 Management Addresses 220 Section II Basic Operations...
Page 244: ...Chapter 10 IPv4 and IPv6 Management Address Commands 244 Section II Basic Operations...
Page 264: ...Chapter 12 SNTP Client Commands 264 Section II Basic Operations...
Page 298: ...Chapter 15 Enhanced Stacking 298 Section II Basic Operations...
Page 312: ...Chapter 16 Enhanced Stacking Commands 312 Section II Basic Operations...
Page 318: ...Chapter 17 Port Mirror 318 Section II Basic Operations...
Page 324: ...Chapter 18 Port Mirror Commands 324 Section II Basic Operations Example awplus show mirror...
Page 350: ...Chapter 21 Multicast Commands 350 Section II Basic Operations...
Page 352: ...352 Section III File System...
Page 360: ...Chapter 22 File System 360 Section III File System...
Page 383: ...AT 9000 Switch Command Line User s Guide Section III File System 383 Example awplus show boot...
Page 386: ...Chapter 25 Boot Configuration File Commands 386 Section III File System...
Page 398: ...Chapter 26 File Transfers 398 Section III File System...
Page 406: ...Chapter 27 File Transfer Commands 406 Section III File System...
Page 408: ...408 Section IV Event Messages...
Page 430: ...Chapter 30 Syslog Client 430 Section IV Event Messages...
Page 438: ...438 Section V Port Trunks...
Page 448: ...Chapter 32 Static Port Trunks 448 Section V Port Trunks...
Page 480: ...480 Section VI Spanning Tree Protocols...
Page 520: ...Chapter 38 STP Commands 520 Section VI Spanning Tree Protocols...
Page 558: ...558 Section VII Virtual LANs...
Page 600: ...Chapter 42 Port based and Tagged VLAN Commands 600 Section VII Virtual LANs...
Page 634: ...Chapter 44 GARP VLAN Registration Protocol Commands 634 Section VII Virtual LANs...
Page 670: ...Chapter 47 Private Port VLANs 670 Section VII Virtual LANs...
Page 692: ...Chapter 50 VLAN Stacking 692 Section VII Virtual LANs...
Page 698: ...Chapter 51 VLAN Stacking Commands 698 Section VII Virtual LANs...
Page 700: ...700 Section VIII Port Security...
Page 748: ...Chapter 54 802 1x Port based Network Access Control 748 Section VIII Port Security...
Page 790: ...Chapter 55 802 1x Port based Network Access Control Commands 790 Section VIII Port Security...
Page 792: ...792 Section IX Simple Network Management Protocols...
Page 804: ...Chapter 56 SNMPv1 and SNMPv2c 804 Section X Simple Network Management Protocols...
Page 852: ...852 Section X Network Management...
Page 976: ...Chapter 63 Address Resolution Protocol ARP 976 Section X Network Management...
Page 1090: ...1090 Section XI Management Security...
Page 1114: ...Chapter 71 Telnet Server 1114 Section XI Management Security...
Page 1122: ...Chapter 73 Telnet Client 1122 Section XI Management Security...
Page 1126: ...Chapter 74 Telnet Client Commands 1126 Section XI Management Security...
Page 1138: ...Chapter 75 Secure Shell SSH Server 1138 Section XI Management Security...
Page 1158: ...Chapter 78 Non secure HTTP Web Browser Server Commands 1158 Section XI Management Security...
Page 1186: ...Chapter 80 Secure HTTPS Web Browser Server Commands 1186 Section XI Management Security...
Page 1202: ...Chapter 81 RADIUS and TACACS Clients 1202 Section XI Management Security...
Page 1230: ...Chapter 82 RADIUS and TACACS Client Commands 1230 Section XI Management Security...