
3-10
# Configure to authenticate users logging in to VTY 0 in the scheme mode.
[Sysname-ui-vty0] authentication-mode scheme
# Configure Telnet protocol is supported.
[Sysname-ui-vty0] protocol inbound telnet
# Set the maximum number of lines the screen can contain to 30.
[Sysname-ui-vty0] screen-length 30
# Set the maximum number of commands the history command buffer can store to 20.
[Sysname-ui-vty0] history-command max-size 20
# Set the timeout time to 6 minutes.
[Sysname-ui-vty0] idle-timeout 6
z
Configure the authentication scheme
Configure the authentication server by referring to related parts in
AAA Configuration
.
Logging In Through SSH
Secure Shell (SSH) offers an approach to logging into a remote device securely. With encryption and
strong authentication, it protects devices against attacks such as IP spoofing and plain text password
interception. For the security features provided by SSH, see
SSH Configuration
in the
Security Volume
.
Configuring Command Authorization
By default, command level for a login user depends on the user level. The user is authorized the
command with the default level not higher than the user level. With the command authorization
configured, the command level for a login user is decided by both the user level and AAA authorization.
If a user executes a command of the corresponding user level, the authorization server checks whether
the command is authorized. If yes, the command can be executed.
The authorization server checks the commands authorized for users through the username, and thus
the command authorization configuration involves four steps:
1) Configure the authentication mode as
scheme
(that is,
use username and password are required
for authentication) when users log in.
2) Enable command authorization. See the following table for details.
3) Configure a HWTACACS scheme. Specify the IP addresses of the HWTACACS authorization
servers and other related parameters.
4) Configure the ISP domain to use the HWTACACS scheme for command line users. For details,
refer to the section
Configuring AAA Authorization Methods for an ISP Domain
of
AAA
Configuration
in the
Security Volume
.
Follow these steps to enable command authorization:
To do…
Use the command…
Remarks
Enter system view
system-view
—
Enter AUX user interface view
user-interface vty
first
-
number
[
last-number
]
—
Summary of Contents for S5120-EI Series
Page 139: ...ii...
Page 578: ...1 21 C...
Page 739: ...1 12 Enable ARP detection based on 802 1X security entries SwitchB arp detection mode dot1x...
Page 926: ...2 8...
Page 942: ...ii Single Device Upgrade 3 4 IRF System Upgrade 3 5...
Page 985: ...1 1...
Page 1018: ...1 6...