C
OMMAND
L
INE
I
NTERFACE
4-34
Example
This example shows how to renumber all units.
User Access Commands
The basic commands required for management access are listed in this
section. This switch also includes other options for password checking via
the console or a Telnet connection (page 4-13), user authentication via a
remote authentication server (page 4-91), and host access authentication
for specific ports (page 4-104).
username
This command adds named users, requires authentication at login,
specifies or changes a user's password (or specify that no password is
required), or specifies or changes a user's access level. Use the
no
form to
remove a user name.
Syntax
username
name
{
access-level
level
|
no password
|
password
{
0
|
7
}
password
}
no username
name
•
name
- The name of the user.
(Maximum length: 8 characters, case sensitive. Maximum users: 16)
•
access-level
level
- Specifies the user level.
The device has two predefined privilege levels:
0
: Normal Exec,
15
: Privileged Exec.
•
nopassword
- No password is required for this user to log in.
• {
0
|
7
} - 0 means plain password, 7 means encrypted password.
Console#switch all renumber
Console#
Table 4-9 User Access Commands
Command
Function
Mode Page
username
Establishes a user name-based authentication
system at login
GC
4-34
enable password
Sets a password to control access to the
Privileged Exec level
GC
4-36
Summary of Contents for 8700S-130
Page 2: ......
Page 3: ......
Page 8: ...LIMITED WARRANTY iv ...
Page 56: ...INITIAL CONFIGURATION 2 18 ...
Page 189: ...PORT CONFIGURATION 3 133 Figure 3 61 Port Statistics continued ...
Page 566: ...COMMAND LINE INTERFACE 4 294 ...
Page 571: ...SOFTWARE SPECIFICATIONS A 5 Trap RFC 1215 UDP MIB RFC 2012 ...
Page 572: ...SOFTWARE SPECIFICATIONS A 6 ...
Page 576: ...TROUBLESHOOTING B 4 ...
Page 589: ......
Page 591: ...38 Tesla Irvine CA 92618 Phone 949 679 8000 ...
Page 592: ... 8 ...