1-20
To do…
Use the command…
Remarks
Configure the binding attributes for
the local user
bind-attribute
{
call-number
call-number
[ :
subcall-number
] |
ip
ip-address
|
location
port
slot-number subslot-number
port-number
|
mac
mac-address
|
vlan vlan-id
} *
Optional
By default, no binding
attribute is configured for a
local user.
Configure the authorization
attributes for the local user
authorization-attribute
{
acl
acl-number
|
callback-number
callback-number
|
idle-cut
minute
|
level
level
|
user-profile
profile-name
|
vlan
vlan-id
|
work-directory
directory-name
} *
Optional
By default, no authorization
attribute is configured for a
local user.
Set the expiration time of the user
expiration-date time
Optional
Not set by default
Specify the user group for the local
user
group
group-name
Optional
By default, a local user
belongs to default user
group
system
.
Note that:
z
With the
local-user password-display-mode
cipher-force
command configured, a local user
password is always displayed in cipher text, regardless of the configuration of the
password
command. In this case, if you use the
save
command to save the configuration, all existing local
user passwords will still be displayed in cipher text after the device restarts, even if you restore the
display mode to
auto
.
z
The
access-limit
command configured for a local user takes effect only when local accounting is
used.
z
Local authentication checks the service types of a local user. If the service types are not available,
the user cannot pass authentication.
z
In the authentication method that requires the username and password, including local
authentication, RADIUS authentication and HWTACACS authentication, the commands that a
login user can use after logging in depend on the level of the user. In other authentication methods,
which commands are available depends on the level of the user interface. For an SSH user using
public key authentication, the commands that can be used depend on the level configured on the
user interface. For details regarding authentication method and commands accessible to user
interface, refer to
Login Configuration
in the
System Volume.
z
Binding attributes are checked upon authentication of a local user. If the checking fails, the user
fails the authentication. Therefore, be cautious when deciding which binding attributes should be
configured for a local user.
z
Every configurable authorization attribute has its definite application environments and purposes.
Therefore, when configuring authorization attributes for a local user, consider what attributes are
needed.
Configuring User Group Attributes
For simplification of local user configuration and manageability of local users, the concept of user group
is introduced. A user group consists of a group of local users and has a set of local user attributes. You
Содержание 4500G PWR 24-Port
Страница 200: ...1 5 ProviderB GigabitEthernet1 0 2 undo stp enable ProviderB GigabitEthernet1 0 2 bpdu tunnel dot1q stp ...
Страница 252: ...1 7 Clearing ARP entries from the ARP table may cause communication failures ...
Страница 362: ...i Table of Contents 1 Dual Stack Configuration 1 1 Dual Stack Overview 1 1 Configuring Dual Stack 1 1 ...
Страница 407: ...1 8 1 1 ms 1 ms 1 ms 1 1 6 1 2 1 ms 1 ms 1 ms 1 1 4 1 3 1 ms 1 ms 1 ms 1 1 2 2 Trace complete ...
Страница 786: ...1 16 3 In the case of PIM SM use the display current configuration command to check the BSR and RP information ...
Страница 1387: ...1 23 ...
Страница 1443: ...i Table of Contents 1 URPF Configuration 1 1 URPF Overview 1 1 What is URPF 1 1 How URPF Works 1 1 Configuring URPF 1 2 ...
Страница 1720: ...ii Single Device Upgrade 3 4 IRF System Upgrade 3 5 ...