580
C
HAPTER
30: P
ASSWORD
C
ONTROL
C
ONFIGURATION
O
PERATIONS
Configuring a User Login
Password in Encryption
Mode
Configuring Login
Attempts Limitation and
Failure Processing Mode
When the maximum number of attempts is exceeded, the system operates in one of
the following processing mode:
■
locktime
: In this mode, the system inhibits the user from re-logging in within a
certain time period. After the period, the user is allowed to log into the switch
again. By default, this time is 120 minutes.
■
lock
: In this mode, the system inhibits the user from re-logging in forever. The user
is allowed to log into the switch again only after the administrator removes the
user from the user blacklist.
■
unlock
: In this mode, the system allows the user to log in again.
No inhibition operation is performed for the users who execute the
Super
command
but fail to log in using the password.
If a user in the blacklist changes his/her IP address, the blacklist will not affect the user
any more when the user logs into the switch.
Table 639
Configuring a user login password in encryption mode
Operation
Command
Description
Enter system view
system-view
—
Enter the specified user
view
l
ocal-user
username
—
Configure a user login
password in encryption
mode
password
Optional
Input a password according to
the system prompt and ensure
the two input passwords are
consistent.
Table 640
Configure the login attempts limitation and the failure processing mode
Operation
Command
Description
Enter system view
system-view
—
Enable the login attempts
limitation, configure the
maximum number of
attempts and configure the
processing mode used
when the maximum
number of attempts is
exceeded.
password-control
login-attempt
login-times
[
exceed
{
lock | unlock | locktime
time
} ]
Optional
By default, the maximum
number of attempts is three,
and the switch operates in the
locktime
processing mode
when the maximum number of
attempts is exceeded.
View the user information
in the blacklist
display password-control blacklist
Optional
You can use the
display
command in any view
Содержание 5500 SI - Switch - Stackable
Страница 24: ...24 ABOUT THIS GUIDE...
Страница 30: ...30 CHAPTER 1 GETTING STARTED Figure 3 Setting up a New Connection Figure 4 Configuring the Port for Connection...
Страница 50: ...50 CHAPTER 1 GETTING STARTED...
Страница 54: ...54 CHAPTER 2 ADDRESS MANAGEMENT CONFIGURATION...
Страница 78: ...78 CHAPTER 3 PORT OPERATION...
Страница 88: ...88 CHAPTER 4 XRN CONFIGURATION...
Страница 122: ...122 CHAPTER 8 VLAN VPN CONFIGURATION...
Страница 216: ...216 CHAPTER 15 SSH TERMINAL SERVICES...
Страница 268: ...268 CHAPTER 16 IP ROUTING PROTOCOL OPERATION...
Страница 308: ...308 CHAPTER 17 NETWORK PROTOCOL OPERATION...
Страница 349: ...349...
Страница 350: ...350 CHAPTER 18 MULTICAST PROTOCOL...
Страница 522: ...522 CHAPTER 22 FILE SYSTEM MANAGEMENT...
Страница 584: ...584 CHAPTER 30 PASSWORD CONTROL CONFIGURATION OPERATIONS...
Страница 600: ...600 CHAPTER 31 MSDP CONFIGURATION...
Страница 614: ...614 CHAPTER 32 CLUSTERING...
Страница 670: ...670 CHAPTER C AUTHENTICATING THE SWITCH 5500 WITH CISCO SECURE ACS...