2-16
Configuring Username and Password Security
Front-Panel Security
Steps for Disabling Password-Recovery.
1.
Set the CLI to the global interface context.
2.
Use
show front-panel-security
to determine whether the factory-reset
parameter is enabled. If it is disabled, use the
front-panel-security factory-
reset
command to enable it.
3.
Press and release the Clear button on the front panel of the switch.
4.
Within 60-seconds of pressing the Clear button, enter the following com-
mand:
no front-panel-security password-recovery
5.
Do one of the following after the “
CAUTION
” message appears:
•
If you want to complete the command, press
[Y]
(for “Yes”).
•
If you want to abort the command, press
[N]
(for “No”)
Figure 2-11 shows an example of disabling the
password-recovery
parameter.
Syntax:
[no] front-panel-security password-recovery
Enables or (using the “
no
” form of the command) disables the
ability to recover a lost password.
When this feature is enabled, the switch allows management
access through the password recovery process described below.
This provides a method for recovering from a lost manager
username (if configured) and password. When this feature is
disabled, the password recovery process is disabled and the
only way to regain management access to the switch is to use
the Reset+Clear button combination (page 2-9) to restore the
switch to its factory default configuration.
Note:
To disable
password-recovery:
– You must have physical access to the front panel of the
switch.
–
The
factory-reset
parameter must be enabled (the default).
(Default: Enabled.)
Summary of Contents for ProCurve 2510G Series
Page 1: ...Access Security Guide www procurve com ProCurve Series 2510G Switches Y 11 XX ...
Page 2: ......
Page 3: ...ProCurve Series 2510G Switches Access Security Guide June 2008 ...
Page 12: ...x ...
Page 26: ...1 10 Getting Started Need Only a Quick Start ...
Page 105: ...4 31 TACACS Authentication Configuring TACACS on the Switch ...
Page 106: ...4 32 TACACS Authentication Configuring TACACS on the Switch ...
Page 176: ...6 30 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Page 198: ...7 22 Configuring Secure Socket Layer SSL Common Errors in SSL Setup ...
Page 296: ...9 40 Configuring and Monitoring Port Security Configuring Protected Ports ...
Page 310: ...10 14 Using Authorized IP Managers Operating Notes ...
Page 318: ...8 Index ...
Page 319: ......