
1294
|
Security
www.dell.com | support.dell.com
Usage
Information
The software measures the period of inactivity defined in this command as the period between
consecutive keystrokes. For example, if your password is “password” you can enter “p” and wait 29
seconds to enter the next letter.
username
c e s
Establish an authentication system based on user names.
Syntax
username
name
[
access-class
access-list-name
] [
nopassword |
{
password | secret
}
[
encryption-type
]
password
]
[
privilege
level
]
If you do not want a specific user to enter a password, use the
nopassword
option.
To delete authentication for a user, use the
no username
name
command.
Parameters
Defaults
The default encryption type for the
password
option is 0. The default encryption type for the
secret
option is 0.
Command Modes
CONFIGURATION
Command
History
Usage
Information
To view the defined user names, use the
user command.
name
Enter a text string for the name of the user up to 63 characters.
access-class
access-list-name
Enter the keyword
access-class
followed by the name of a configured access
control list (either a IP access control list or MAC access control list).
nopassword
Enter the keyword
nopassword
to specify that the user should not enter a
password.
password
Enter the keyword
password
followed by the
encryption-type
or the password.
secret
Enter the keyword
secret
followed by the
encryption-type
or the password.
encryption-type
Enter an encryption type for the
password
that you will enter.
•
0 directs FTOS to store the password as clear text. It is the default encryption
type when using the
password
option.
•
7 to indicate that a password encrypted using a DES hashing algorithm will
follow. This encryption type is available with the
password
option only.
•
5 to indicate that a password encrypted using an MD5 hashing algorithm will
follow. This encryption type is available with the
secret
option only, and is the
default encryption type for this option.
password
Enter a string up to 32 characters long.
privilege
level
Enter the keyword
privilege
followed by a number from zero (0) to 15.
secret
Enter the keyword
secret
followed by the encryption type.
Version 7.7.1.0
Added support for
secret
option and MD5 password encryption. Extended
name
from 25 characters to 63.
Version 7.6.1.0
Introduced for S-Series
Version 7.5.1.0
Introduced for C-Series
E-Series original Command
Summary of Contents for Force10 TeraScale C Series
Page 1: ...FTOS Command Line Reference Guide FTOS 8 4 2 7 E Series TeraScale C Series S Series S50 S25 ...
Page 164: ...164 Control and Monitoring w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 176: ...176 802 1ag w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 188: ...188 802 3ah w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 204: ...204 802 1X w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 294: ...294 Access Control Lists ACL w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 428: ...428 Border Gateway Protocol IPv4 BGPv4 w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 456: ...456 Configuration Rollback w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 472: ...472 Dynamic Host Configuration Protocol DHCP w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 484: ...484 Far End Failure Detection FEFD w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 682: ...682 IPv4 Routing w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 732: ...732 IPv6 Basics w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 896: ...896 Layer 2 w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 914: ...914 Link Layer Detection Protocol LLDP w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 926: ...926 Multicast Listener Discovery MLD w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 952: ...952 Multiple Spanning Tree Protocol MSTP w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 976: ...976 Multicast w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 984: ...984 Neighbor Discovery Protocol NDP w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 1094: ...1094 Policy based Routing PBR w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 1130: ...1130 PIM Sparse Mode PIM SM w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 1164: ...1164 Private VLAN PVLAN w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 1276: ...1276 Rapid Spanning Tree Protocol RSTP w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 1342: ...1342 Service Provider Bridging w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 1354: ...1354 sFlow w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 1428: ...1428 Spanning Tree Protocol STP w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 1444: ...1444 Time and Network Time Protocol NTP w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 1464: ...1464 VLAN Stacking w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 1494: ...1494 Virtual Router Redundancy Protocol VRRP w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 1534: ...1534 C Series Diagnostics and Debugging w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 1574: ...1574 E Series Debugging and Diagnostics w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 1592: ...1592 S Series Debugging and Diagnostics w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 1622: ...1622 Index w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 1640: ...1640 Command Index w w w d e l l c o m s u p p o r t d e l l c o m ...