Chapter 7
| Authentication Commands
User Accounts
– 167 –
username
This command adds named users, requires authentication at login, specifies or
changes a user's password (or specify that no password is required), or specifies or
changes a user's access level. Use the
no
form to remove a user name.
Syntax
username
name
{
access-level
level
|
nopassword
|
password
{
0
|
7
}
password
}
no username
name
name
- The name of the user. (Maximum length: 8 characters, case sensitive.
Maximum users: 16)
access-level
level
- Specifies the user level.
The device has two predefined privilege levels:
0
: Normal Exec,
15
: Privileged Exec.
nopassword
- No password is required for this user to log in.
{
0
|
7
} - 0 means plain password, 7 means encrypted password.
password
password
- The authentication password for the user.
(Maximum length: 32 characters plain text or encrypted, case sensitive)
Default Setting
The default access level is Normal Exec.
The factory defaults for the user names and passwords are:
Command Mode
Global Configuration
Command Usage
The encrypted password is required for compatibility with legacy password
settings (i.e., plain text or encrypted) when reading the configuration file during
system bootup or when downloading the configuration file from an FTP/TFTP
server. There is no need for you to manually configure encrypted passwords.
Example
This example shows how the set the access level and password for a user.
Console(config)#username bob access-level 15
Console(config)#username bob password 0 smith
Console(config)#
Table 33: Default Login Settings
username
access-level
password
guest
motorola
0
15
guest
admin
Summary of Contents for EX-3524
Page 2: ......
Page 28: ...Figures 28 ...
Page 34: ...Section I Getting Started 34 ...
Page 58: ...Chapter 1 Initial Switch Configuration Setting the System Clock 58 ...
Page 72: ...Chapter 2 Using the Command Line Interface CLI Command Groups 72 ...
Page 156: ...Chapter 5 SNMP Commands Notification Log Commands 156 ...
Page 164: ...Chapter 6 Remote Monitoring Commands 164 ...
Page 218: ...Chapter 7 Authentication Commands Management IP Filter 218 ...
Page 268: ...Chapter 8 General Security Measures Port based Traffic Segmentation 268 ...
Page 292: ...Chapter 9 Access Control Lists ACL Information 292 ...
Page 312: ...Chapter 10 Interface Commands Power Savings 312 ...
Page 324: ...Chapter 11 Link Aggregation Commands Trunk Status Display Commands 324 ...
Page 366: ...Chapter 15 Address Table Commands 366 ...
Page 428: ...Chapter 17 VLAN Commands Configuring Voice VLANs 428 ...
Page 572: ...Chapter 25 IP Interface Commands IPv6 Interface 572 ...
Page 578: ...Section I Appendices 578 ...