9
By default, the system displays a message about a weak password but does not force the user to
change it. To improve the device security, you can enable the mandatory weak password change
feature, which forces the users to change the identified weak passwords. The users can log in to the
device only after their passwords meet the password requirements.
To view the password requirements, use the
display password-control
command. To
change the password composition restriction, the minimum password length, and the password
complexity checking policy, use the
password-control composition
,
password-control
length
, and
password-control complexity
commands, respectively.
Examples
# Enable the mandatory weak password change feature.
<Sysname> system-view
[Sysname] password-control change-password weak-password enable
Related commands
display password-control
password-control
{
aging
|
composition
|
history
|
length
}
password-control complexity
password-control composition
password-control length
password-control enable
password-control complexity
Use
password-control complexity
to configure the password complexity checking policy.
Use
undo password-control complexity
to remove a password complexity checking item.
Syntax
password-control complexity
{
same-character
|
user-name
}
check
undo password-control complexity
{
same-character
|
user-name
}
check
Default
•
In non-FIPS mode:
The global password complexity checking policy is that username checking is enabled and
repeated character checking is disabled. The password complexity checking policy for a user
group equals the global setting. The password complexity checking policy for a local user
equals that of the user group to which the local user belongs.
•
In FIPS mode:
The global password complexity checking policy is that both username checking and repeated
character checking are disabled. The password complexity checking policy for a user group
equals the global setting. The password complexity checking policy for a local user equals that
of the user group to which the local user belongs.
Views
System view
User group view
Local user view
Predefined user roles
network-admin
Summary of Contents for SOHO IE4300
Page 285: ...i Contents Tcl commands 1 cli 1 tclquit 1 tclsh 2...
Page 288: ...i Contents Python commands 1 exit 1 python 1 python filename 2...
Page 291: ...i Contents Automatic configuration commands 1 autodeploy udisk enable 1...
Page 323: ...25 Sysname Ten GigabitEthernet1 0 51 undo shutdown Related commands irf port...
Page 465: ...ii stp vlan enable 55 vlan mapping modulo 55...
Page 602: ...12 Related commands display mvrp statistics...
Page 609: ...i Contents VLAN mapping commands 1 display vlan mapping 1 vlan mapping 2...
Page 678: ...9 Related commands reset pppoe relay statistics...
Page 846: ...i Contents Basic IP forwarding commands 1 display fib 1 ip forwarding table save 2...
Page 1770: ...i Contents Time range commands 1 display time range 1 time range 1...
Page 2026: ...34 Related commands display mac authentication...
Page 2028: ...ii...
Page 2143: ...i Contents User profile commands 1 display user profile 1 user profile 2...
Page 2308: ...61 ipsec transform set...
Page 2531: ...i Contents SAVI commands 1 ipv6 savi down delay 1 ipv6 savi log enable 1 ipv6 savi strict 2...
Page 2534: ...3 Sysname ipv6 savi strict Related commands ipv6 verify source...
Page 2791: ...14 Sysname track 1 Related commands delay display track...
Page 2939: ...9 sntp authentication keyid sntp reliable authentication keyid...
Page 2967: ...27 Related commands apply poe profile poe enable poe max power interface view poe priority...