H3C Technologies H3C S7500E Series Switches User Manual

Page 31

Advertising
background image

1-20

To do…

Use the command…

Remarks

Enter user interface view

user-interface { first-num1

[ last-num1 ] | { aux | vty }

first-num2 [ last-num2 ] }

Configure the authentication mode

for any user that uses the current

user interface to log in to the

switch

authentication-mode { none |

password }

Optional

By default, the authentication

mode for VTY and AUX user

interfaces is password, and no

authentication is needed for AUX

login users.

Configure the privilege level of

users logged in through the current

user interface

user privilege level level

Optional

By default, the user privilege level

for users logged in through the

console user interface is 3, and

that for users logged in through the

other user interfaces is 0.

Example of configuring a user privilege level under a user interface

# Authenticate users logged in to the switch through Telnet, verify their password, and specify their

user privilege level as 2.

<Sysname> system-view

[Sysname] user-interface vty 0 4

[Sysname-ui-vty1] authentication-mode password

[Sysname-ui-vty0-4] set authentication password cipher 123

[Sysname-ui-vty0-4] user privilege level 2

By default, users logged in through telnet use the commands of level 0 after passing the authentication.

After the above configuration, when users log in to the switch through Telnet, they need to input

password 123, and then they can use commands of levels 0, 1, and 2.

z

For more information about user interfaces, see CLI Login in the Fundamentals Configuration

Guide. For more information about the user-interface, authentication-mode, and user privilege

level commands, see Logging In to the Switch Commands in the Fundamentals Command

Reference.

z

For more information about AAA authentication, see AAA Configuration in the Security

Configuration Guide. For more information about the local-user and authorization-attribute

commands, see AAA Configuration Commands in the Security Command Reference.

z

For more information about SSH, see SSH 2.0 Configuration in the Security Configuration Guide.

Advertising