1
Introduction
1-15
Logging In and Logging Out
hexadecimal characters must follow the backslash. All printable
ASCII characters can be entered using the keyboard or using its
hexadecimal value except for the backslash character. If a backslash
is desired as part of the password its hexadecimal representation
must be used. Spaces are valid, but if they appear at the begging of
the password then they will be ignored. The following are examples
of valid secrets.
simplesecret****
This is an example of a secret that does not use any special characters.
\40\72\A3\F9\12\13\14\15\16\17\18\19\55\33\87\42
This is an example of a secret of length 4 that is configured using the
hexadecimal representation.
a9p\40\40xx\44\88kutfe\89h
This is an example of a secret that has a length of 7 characters that are
composed of a mix using hexadecimal and the printable ASCII
characters.
login
Syntax
login
Purpose
This command allows a Telnet client to connect to the switch.
Description
This command allows the user to log in with either administrator or
operator access rights. The default passwords are
password
.
The login command is called automatically by the CLI each time a
new Telnet session is activated, as well as each time new
administrator access rights are configured.
After the login command is issued, the Username: prompt
automatically displays. After a valid user name is entered, the
Password: prompt automatically displays. After the corresponding
valid password is entered, the
Root>
prompt displays. At this
prompt the user may enter any of the commands included in
Table 1-2,
CLI Command Tree
, page 1-5.
When users are prompted to change the password when logging in,
they can enter the default password (
password
). This will be accepted.
However, at the next login, they will again be required to change the
password, if the default password is still being used. When the user
Summary of Contents for Enterprise Operating System
Page 1: ...Enterprise Operating System Command Line Interface User Manual P N 620 000134 720 REV A...
Page 4: ...Enterprise Operating System Command Line Interface User Manual iv...
Page 12: ...Enterprise Operating System Command Line Interface User Manual xii Contents...
Page 14: ...xiv Enterprise Operating System Command Line Interface User Manual Tables...
Page 20: ...xx Enterprise Operating System Command Line Interface User Manual Preface...
Page 44: ...1 1 24 Enterprise Operating System Command Line Interface User Manual Backup and Restoration...
Page 240: ...2 2 196 Enterprise Operating System Command Line Interface User Manual show...
Page 290: ...A A 50 Enterprise Operating System Command Line Interface User Manual...
Page 300: ...B B 10 Enterprise Operating System Command Line Interface User Manual...
Page 328: ...Enterprise Operating System Command Line Interface User Manual i 10 Index...