130
Configuring user privilege and command levels
Introduction
To avoid unauthorized access, the switch defines user privilege levels and command levels. User privilege
levels correspond to command levels. When a user at a specific privilege level logs in, the user can only
use commands at that level, or lower levels.
All the commands are categorized into four levels: visit, monitor, system, and manage, and are identified
from low to high, respectively by 0 through 3.
describes the command levels.
Table 16
Default command levels
Level Privilege
Description
0 Visit
Involves commands for network diagnosis and commands for accessing an
external device. Configuration of commands at this level cannot survive a device
restart. Upon device restart, the commands at this level will be restored to the
default settings.
Commands at this level include
ping
,
tracert
,
telnet
and
ssh2
.
1 Monitor
Involves commands for system maintenance and service fault diagnosis.
Commands at this level are not allowed to be saved after being configured. After
the switch is restarted, the commands at this level will be restored to the default
settings.
Commands at this level include
debugging
,
terminal
,
refresh
, and
send
.
2 System
Provides service configuration commands, including routing configuration
commands and commands for configuring services at different network levels.
By default, commands at this level include all configuration commands except for
those at manage level.
3 Manage
Involves commands that influence the basic operation of the system and
commands for configuring system support modules.
By default, commands at this level involve the configuration commands of file
system, FTP, TFTP, Xmodem download, user management, level setting, and
parameter settings within a system (which are not defined by any protocols or
RFCs).
Configuring a user privilege level
A user privilege level can be configured by using AAA authentication parameters or under a user
interface.
Configure user privilege level by using AAA authentication parameters
If the authentication mode of a user interface is scheme, the user privilege level of users logging into the
user interface is specified in AAA authentication configuration.
Follow these steps to configure the user privilege level by using AAA authentication parameters:
To do…
Use the command…
Remarks
Enter system view
system-view
—