Configuration Guide
Basic Switch Management Configuration
To re-configure or modify the password lifecycle, the original configuration must
be removed.Once the password lifecycle is re-configured, its expiry time will be
re-calculated.
For the password lifecycle check, the password expiry time is the system time
when the password lifecycle is configured plus the password lifecycle.For
example, a password lifecycle is configured as 5 days on the system date
2011-8-5, then the password will expire on 2011-8-10.Before configuring a
password lifecycle, ensure that the system date is correct.If the system date is
modified during the lifecycle, a deviation of password lifecycle may be
caused.For example, if the system date is changed into 2011-8-11 on 2011-8-9,
the password has expired in spite of its use for only 4 days. The password
expiry will be prompted and password change will be required when the user
logs in later.
Supporting Session Locking
Our products allow you to lock the session terminal temporarily using the
lock
command, so as to prevent access. To this end, enable the terminal locking
function in the line configuration mode, and lock the terminal using the
lock
command in the EXEC mode of the terminal:
Command
Purpose
Ruijie(config-line)#
lockable
Enable the function of locking the line
terminal
Ruijie#
lock
Lock the current line terminal
Logon Authentication Control
Overview
In the previous section, we have described how to control the access to network
devices by configuring the locally stored password. In addition to line password
protection and local authenticaion, in AAA mode, we can authenticate users
‟
management privilege based on their usernames and passwords on some
servers when they log on to the switch, take RADIUS server for example.
With RADIUS server, the network device sends the encrypted user information
to the RADIUS server for authentiction rather than autenticates them with the
locally stored credentials. The RADIUS server configures user information
consistently like user name, password, shared key, and access policy to
facilitate the management and control of user access and enhance the security
of user informaiton.
Содержание RG-S2900G-E Series
Страница 1: ...RG S2900G E Series Switch RGOS Configuration Guide Release 10 4 2b12 p1 ...
Страница 91: ...Configuration Guide Configuring PoE Configuration ...
Страница 133: ...Configuration Guide EEE Configuration ...
Страница 319: ...Configuration Guide QinQ Configuration ...
Страница 408: ......
Страница 409: ...IP Routing Configuration 1 Static Route Configuration ...
Страница 412: ......
Страница 413: ...Multicast Configuration 1 IGMP Snooping Configuration 2 MLD Snooping Configuration ...
Страница 621: ...Configuration Guide CPU Protection Configuration udp helper 180 4 dhcp client 180 4 lacp 180 4 ...
Страница 757: ......
Страница 758: ...ACL QoS Configuration 1 Access Control List Configuration 2 QoS Configuration ...
Страница 801: ...Reliability Configuration 1 RLDP Configuration 2 TPP Configuration 3 SEM Configuration ...
Страница 901: ...Configuration Guide ERSPAN Configuration ...
Страница 902: ...Web based Configuration 1 Web based Configuration ...