Password Control Configuration
341
Password Control
Configuration
Configuration
Prerequisites
A user PC is connected to the Switch 4500 to be configured; both devices are
operating normally.
Configuration Tasks
The following sections describe the configuration tasks for password control:
■
Configuring Password Aging
■
Configuring the Minimum Password Length
■
Configuring History Password Recording
■
Configuring User Login Password in Encryption Mode
■
Configuring Login Attempts Limitation and Failure Procession Mode
■
Configuring the Timeout for User Password Authentication
After the above configuration, you can execute the
display password-control
command in any view to check the information about the global password control
for all users, including the enable/disable state of password aging, the aging time,
the enable/disable state of the shortest-password limitation, the configured
User blacklist
If the maximum attempt times is
exceeded, the user cannot log in the
switch and is added to the blacklist
by the switch. All users in the
blacklist are not allowed to log in
the switch.
For the user inhibited from login for
a certain time period, the switch will
remove the user from the blacklist
when the time period is used out.
For the user inhibited from login
forever, the switch provides a
command which allows the
administrator to manually remove
the user from the blacklist.
The blacklist is saved in the RAM of
the switch, so it will be lost when
the switch reboots.
System logging
The switch automatically logs the
following events:
■
Successful user login: The switch
logs the user name, user IP
address, and VTY ID.
■
Inhibition of a user due to ACL
rule: The switch logs the user IP
address.
■
User authentication failure. The
switch logs the user name, user
IP address, VTY ID, and failure
reason.
No configuration is needed for
this function
Table 368
Functions Provided by Password Control
Function
Description
Application
Содержание Switch 4500 26-Port
Страница 16: ...14 ABOUT THIS GUIDE...
Страница 58: ...56 CHAPTER 2 PORT OPERATION...
Страница 104: ...102 CHAPTER 5 NETWORK PROTOCOL OPERATION...
Страница 130: ...128 CHAPTER 6 IP ROUTING PROTOCOL OPERATION...
Страница 154: ...152 CHAPTER 7 ACL CONFIGURATION...
Страница 228: ...226 CHAPTER 11 802 1X CONFIGURATION...
Страница 250: ...248 CHAPTER 14 DEVICE MANAGEMENT...
Страница 280: ...278 CHAPTER 15 SYSTEM MAINTENANCE AND DEBUGGING...
Страница 312: ...310 CHAPTER 18 NTP CONFIGURATION...
Страница 340: ...338 CHAPTER 19 SSH TERMINAL SERVICES...
Страница 350: ...348 CHAPTER 20 PASSWORD CONTROL CONFIGURATION OPERATIONS...
Страница 388: ...386 APPENDIX B RADIUS SERVER AND RADIUS CLIENT SETUP...