Command Line Interface
25
To prevent unauthorized users from illegal intrusion, the user will be identified
when switching from a lower level to a higher level with the
super
[
level
]
command. User ID authentication is performed when users at lower level become
users at a higher level. In other words, the user password for the higher level is
needed. (Suppose the user has entered
super password
[
level
level
]
{
simple
|
cipher
}
password
.
.) For the sake of confidentiality, on the screen the user
cannot see the password that they entered. Only when correct password is input
three times, can the user switch to the higher level. Otherwise, the original user
level will remain unchanged.
Different command views are implemented according to different requirements.
They are related to one another. For example, after logging in to the Switch, you
will enter User View, in which you can only use some basic functions such as
displaying the running state and statistics information. In User View, enter
system-view
to enter System View, in which you can key in different
configuration commands and enter the corresponding views.
The command line provides the following views:
■
User View
■
System View
■
Ethernet Port View
■
VLAN View
■
VLAN Interface View
■
Local-User View
■
User Interface View
■
FTP Client View
■
RSA Public Key View
■
RSA Key Code View
■
RIP View
■
Route Policy View
■
Basic ACL View
■
Advanced ACL View
■
Layer-2 ACL View
■
User-Defined ACL View
■
QoS Profile View
■
RADIUS Server Group View
■
ISP Domain View
Table 5
describes the features of different views and the ways to enter or quit.
Содержание 400 Family
Страница 12: ......
Страница 16: ...14 ABOUT THIS GUIDE ...
Страница 58: ...56 CHAPTER 2 PORT OPERATION ...
Страница 68: ...66 CHAPTER 3 VLAN OPERATION ...
Страница 98: ...96 CHAPTER 5 NETWORK PROTOCOL OPERATION ...
Страница 124: ...122 CHAPTER 6 IP ROUTING PROTOCOL OPERATION ...
Страница 156: ...154 CHAPTER 8 ACL CONFIGURATION ...
Страница 218: ...216 CHAPTER 11 802 1X CONFIGURATION ...
Страница 298: ...296 CHAPTER 13 PASSWORD CONTROL CONFIGURATION OPERATIONS ...
Страница 336: ...334 APPENDIX B RADIUS SERVER AND RADIUS CLIENT SETUP ...