Usage
Information
The software measures the period of inactivity defined in this command as the
period between consecutive keystrokes. For example, if your password is
“password” you can enter “p” and wait 29 seconds to enter the next letter.
username
Establish an authentication system based on user names.
Syntax
username
name
[access-class
access-list-name
] [nopassword |
{password | secret} [
encryption-type
] password] [privilege
level
] [role
role-name
]
If you do not want a specific user to enter a password, use the
nopassword
option.
To delete authentication for a user, use the
no username
name
command.
Parameters
name
Enter a text string for the name of the user up to 63
characters.
access-class
access-list-
name
Enter the keywords
access-class
then the name of a
configured access control list (either an IP access control list
or MAC access control list).
nopassword
Enter the keyword
nopassword
to specify that the user
should not enter a password.
password
Enter the keyword
password
then the
encryption-type
or the password.
secret
Enter the keyword
secret
then the
encryption-type
or
the password.
encryption-
type
Enter an encryption type for the
password
that you enter.
•
0
directs the system to store the password as clear text. It
is the default encryption type when using the
password
option.
•
7
to indicate that a password encrypted using a DES
hashing algorithm follows. This encryption type is
available with the
password
option only.
•
5
to indicate that a password encrypted using an MD5
hashing algorithm follows. This encryption type is
available with the
secret
option only, and is the default
encryption type for this option.
password
Enter a string up to 32 characters long.
privilege
level
Enter the keyword
privilege
then a number from zero (0)
to 15.
role
role-name
Enter the keyword
role
followed by the role name to
associate with that user ID.
Security
1173