2-6
Configuring Username and Password Security
Configuring Local Password Security
To Remove Password Protection.
Removing password protection means
to eliminate password security. This command prompts you to verify that you
want to remove one or both passwords, then clears the indicated password(s).
(This command also clears the username associated with a password you are
removing.) For example, to remove the Operator password (and username, if
assigned) from the switch, you would do the following:
Figure 2-3. Removing a Password and Associated Username from the Switch
The effect of executing the command in figure 2-3 is to remove password
protection from the Operator level. (This means that anyone who can access
the switch console can gain Operator access without having to enter a user-
name or password.)
Web: Setting Passwords and Usernames
In the Web browser interface you can enter passwords and (optional) user-
names.
To Configure (or Remove) Usernames and Passwords in the Web
Browser Interface.
1.
Click on the
Security
tab.
Click on
[Device Passwords]
.
2.
Do one of the following:
•
To set username and password protection, enter the usernames and
passwords you want in the appropriate fields.
•
To remove username and password protection, leave the fields blank.
3.
Implement the usernames and passwords by clicking on
[Apply Changes]
.
To access the Web-based help provided for the switch, click on
[?]
in the Web
browser screen.
Press
[Y]
(for yes) and press [
Enter
].
Summary of Contents for ProCurve 2510-24
Page 1: ...Access Security Guide 2510 www procurve com ProCurve Switches Q 11 XX 2510 24 U 11 XX 2510 48 ...
Page 2: ......
Page 3: ...ProCurve Series 2510 Switches Access Security Guide July 2008 ...
Page 26: ...1 10 Getting Started Need Only a Quick Start ...
Page 104: ...4 30 TACACS Authentication Configuring TACACS on the Switch ...
Page 144: ...5 40 RADIUS Authentication Authorization and Accounting Messages Related to RADIUS Operation ...
Page 174: ...6 30 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Page 196: ...7 22 Configuring Secure Socket Layer SSL Common Errors in SSL Setup ...
Page 294: ...9 40 Configuring and Monitoring Port Security Configuring Protected Ports ...
Page 308: ...10 14 Using Authorized IP Managers Operating Notes ...
Page 316: ...8 Index ...
Page 317: ......