60
RackSwitch G8000: Application Guide
End User Access Control
IBM N/OS allows an administrator to define end user accounts that permit end users
to perform operation tasks via the switch CLI commands. Once end user accounts
are configured and enabled, the switch requires username/password
authentication.
For example, an administrator can assign a user, who can then log into the switch
and perform operational commands (effective only until the next switch reboot).
Considerations for Configuring End User Accounts
Note the following considerations when you configure end user accounts:
•
A maximum of 10 user IDs are supported on the switch.
•
N/OS supports end user support for console, Telnet, BBI, and SSHv2 access to
the switch.
•
If RADIUS authentication is used, the user password on the Radius server will
override the user password on the G8000. Also note that the password change
command only modifies only the user password on the switch and has no effect
on the user password on the Radius server. Radius authentication and user
password cannot be used concurrently to access the switch.
•
Passwords for end users can be up to 128 characters in length for TACACS,
RADIUS, Telnet, SSH, Console, and Web access.
Strong Passwords
The administrator can require use of Strong Passwords for users to access the
G8000. Strong Passwords enhance security because they make password
guessing more difficult.
The following rules apply when Strong Passwords are enabled:
•
Each passwords must be 8 to 14 characters
•
Within the first 8 characters, the password:
– must have at least one number or one symbol
– must have both upper and lower case letters
– cannot be the same as any four previously used passwords
The following are examples of strong passwords:
•
1234AbcXyz
•
Super+User
•
Exo1cet2
The administrator can choose the number of days allowed before each password
expires. When a strong password expires, the user is allowed to log in one last time
(last time) to change the password. A warning provides advance notice for users to
change the password.
Use the Strong Password commands to configure Strong Passwords.
>> #
access user strong-password enable
Summary of Contents for RackSwitch G8000
Page 1: ...RackSwitch G8000 Application Guide...
Page 2: ......
Page 3: ...RackSwitch G8000 Application Guide...
Page 16: ...16 RackSwitch G8000 Application Guide...
Page 22: ...20 RackSwitch G8000 Application Guide...
Page 23: ...Copyright IBM Corp 2011 21 Part 1 Getting Started...
Page 24: ...22 RackSwitch G8000 Application Guide...
Page 54: ...52 RackSwitch G8000 Application Guide...
Page 55: ...Copyright IBM Corp 2011 53 Part 2 Securing the Switch...
Page 56: ...54 RackSwitch G8000 Application Guide...
Page 92: ...90 RackSwitch G8000 Application Guide...
Page 94: ...92 RackSwitch G8000 Application Guide...
Page 144: ...142 RackSwitch G8000 Application Guide...
Page 145: ...Copyright IBM Corp 2011 143 Part 4 Advanced Switch ing Features...
Page 146: ...144 RackSwitch G8000 Application Guide...
Page 148: ...146 RackSwitch G8000 Application Guide...
Page 182: ...180 RackSwitch G8000 Application Guide...
Page 184: ...182 RackSwitch G8000 Application Guide...
Page 212: ...210 RackSwitch G8000 Application Guide...
Page 258: ...256 RackSwitch G8000 Application Guide...
Page 286: ...284 RackSwitch G8000 Application Guide...
Page 294: ...292 RackSwitch G8000 Application Guide...
Page 298: ...296 RackSwitch G8000 Application Guide...
Page 310: ...308 RackSwitch G8000 Application Guide...
Page 311: ...Copyright IBM Corp 2011 309 Part 7 Network Management...
Page 312: ...310 RackSwitch G8000 Application Guide...
Page 320: ...318 RackSwitch G8000 Application Guide...
Page 332: ...330 RackSwitch G8000 Application Guide...
Page 334: ...332 RackSwitch G8000 Application Guide...
Page 345: ...Copyright IBM Corp 2011 343 Part 9 Appendices...
Page 346: ...344 RackSwitch G8000 Application Guide...
Page 357: ...Copyright IBM Corp 2011 Appendix C Notices 355 Taiwan Class A compliance statement...