
556
C
HAPTER
49: P
ASSWORD
C
ONTROL
C
ONFIGURATION
O
PERATIONS
Password Control
Configuration
Configuration
Prerequisites
A user PC is connected to the switch to be configured; both devices are operating
normally.
Configuration Tasks
The following sections describe the configuration tasks for password control:
■
“Configuring Password Aging”
■
“Configuring the Limitation of Minimum Password Length”
Login attempt
limitation and failure
processing.
Login attempt limitation: You can use this function to
enable the switch to limit the number of login attempts
allowed for each user.
Telnet and
SSH
passwords
If the number of login
attempts exceeds the
configured maximum
number, the user fails to
log in. In this case, the
switch provides three
failure processing modes.
By default, the switch
adopts the first mode, but
you can actually specify the
processing mode as
needed.
Inhibit the user from
re-logging in within a
certain time period. After
the period, the user is
allowed to log into the
switch again.
Inhibit the user from
re-logging in forever. The
user is allowed to log into
the switch again only after
the administrator manually
removes the user from the
user blacklist.
Allow the user to log in
again without any
inhibition.
User blacklist
If the maximum number of attempts is exceeded, the
user cannot log into the switch and is added to the
blacklist by the switch. All users in the blacklist are not
allowed to log into the switch.
■
For the user inhibited from logging in for a certain
time period, the switch will remove the user from the
blacklist when the time period expires.
■
For the user inhibited from logging in forever, the
switch provides a command which allows the
administrator to manually remove the user from the
blacklist.
■
The blacklist is saved in the RAM of the switch, so it
will be lost when the switch reboots.
-
System log function
The switch automatically records the following events in
logs:
■
Successful user login. The switch records the user
name, user IP address, and VTY ID.
■
Inhibition of a user due to ACL rule. The switch
records the user IP address.
■
User authentication failure. The switch records the
user name, user IP address, VTY ID, and failure
reason.
No
configuratio
n is needed
for this
function.
Table 408
Functions provided by password control
Function Description
Application
Содержание 4210 PWR
Страница 10: ...Password Control Configuration 556 Displaying Password Control 563 Password Control Configuration Example 564...
Страница 22: ...20 CHAPTER 1 CLI CONFIGURATION...
Страница 74: ...72 CHAPTER 3 CONFIGURATION FILE MANAGEMENT...
Страница 84: ...82 CHAPTER 5 VLAN CONFIGURATION...
Страница 96: ...94 CHAPTER 8 IP PERFORMANCE CONFIGURATION...
Страница 108: ...106 CHAPTER 9 PORT BASIC CONFIGURATION...
Страница 122: ...120 CHAPTER 11 PORT ISOLATION CONFIGURATION...
Страница 140: ...138 CHAPTER 13 MAC ADDRESS TABLE MANAGEMENT...
Страница 234: ...232 CHAPTER 17 802 1X CONFIGURATION...
Страница 246: ...244 CHAPTER 20 AAA OVERVIEW...
Страница 270: ...268 CHAPTER 21 AAA CONFIGURATION...
Страница 292: ...290 CHAPTER 26 DHCP BOOTP CLIENT CONFIGURATION...
Страница 318: ...316 CHAPTER 29 MIRRORING CONFIGURATION...
Страница 340: ...338 CHAPTER 30 CLUSTER...
Страница 362: ...360 CHAPTER 33 SNMP CONFIGURATION...
Страница 368: ...366 CHAPTER 34 RMON CONFIGURATION...
Страница 450: ...448 CHAPTER 39 TFTP CONFIGURATION...
Страница 451: ......
Страница 452: ...450 CHAPTER 39 TFTP CONFIGURATION...
Страница 470: ...468 CHAPTER 40 INFORMATION CENTER...
Страница 496: ...494 CHAPTER 44 DEVICE MANAGEMENT...