2-6
Configuring Username and Password Security
Configuring Local Password Security
To Remove Password Protection.
Removing password protection means
to eliminate password security. This command prompts you to verify that you
want to remove one or both passwords, then clears the indicated password(s).
(This command also clears the username associated with a password you are
removing.) For example, to remove the Operator password (and username, if
assigned) from the switch, you would do the following:
Figure 2-3. Removing a Password and Associated Username from the Switch
The effect of executing the command in figure 2-3 is to remove password
protection from the Operator level. (This means that anyone who can access
the switch console can gain Operator access without having to enter a user-
name or password.)
Web: Setting Passwords and Usernames
In the Web browser interface you can enter passwords and (optional) user-
names.
To Configure (or Remove) Usernames and Passwords in the Web
Browser Interface.
1.
Click on the
Security
tab.
Click on
[Device Passwords]
.
2.
Do one of the following:
•
To set username and password protection, enter the usernames and
passwords you want in the appropriate fields.
•
To remove username and password protection, leave the fields blank.
3.
Implement the usernames and passwords by clicking on
[Apply Changes]
.
To access the Web-based help provided for the switch, click on
[?]
in the Web
browser screen.
Press
[Y]
(for yes) and press [
Enter
].
Содержание ProCurve 2510G Series
Страница 1: ...Access Security Guide www procurve com ProCurve Series 2510G Switches Y 11 XX ...
Страница 2: ......
Страница 3: ...ProCurve Series 2510G Switches Access Security Guide June 2008 ...
Страница 12: ...x ...
Страница 26: ...1 10 Getting Started Need Only a Quick Start ...
Страница 105: ...4 31 TACACS Authentication Configuring TACACS on the Switch ...
Страница 106: ...4 32 TACACS Authentication Configuring TACACS on the Switch ...
Страница 176: ...6 30 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Страница 198: ...7 22 Configuring Secure Socket Layer SSL Common Errors in SSL Setup ...
Страница 296: ...9 40 Configuring and Monitoring Port Security Configuring Protected Ports ...
Страница 310: ...10 14 Using Authorized IP Managers Operating Notes ...
Страница 318: ...8 Index ...
Страница 319: ......