beautypg.com

Security management and password configuration – Dell PowerEdge VRTX User Manual

Page 18

background image

18

Using the CLI

FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell

Plasma\GSG\Plasma_UGUsing_CLI.fm

D E L L C O N F ID E N T IA L – P R E L IM I N A RY 3 / 6 /1 3 - FO R P R O O F O N LY

Security Management and Password

Configuration

System security is handled through the Authentication, Authorization, and

Accounting (AAA) mechanism that manages user access rights, privileges,

and management methods. AAA uses both local and remote user databases.

Data encryption is handled through the SSH mechanism.
Passwords can be configured for the following services:

• Terminal
• Telnet
• SSH
• HTTP
• HTTPS

NOTE:

When creating a user name, the default priority is 14, which provides

access but not configuration rights. A priority of 15 must be set to enable access

and configuration rights to the device. Although user names can be assigned

privilege level 15 without a password, it is recommended to always assign a

password. If there is no specified password, privileged users can access the Web

interface with any password.

NOTE:

Passwords can be secured by using password management commands to

force aging out of passwords, or expiration of passwords. For more information, see

"Management Security" on page 134.

Initial Configuration and Password Recovery

The system is delivered with a default username/password (root/calvin). If a

user-defined password is lost, a password recovery procedure can be invoked

from the Startup menu. This procedure is applicable for the local terminal

only and enables a single access to the device from the local terminal with no

password entered.
The full mode of password recovery mechanism can be enabled/disabled

through the CLI (service password-recovery command).
This affects password recovery in the following way:

Enabled: When the password-recovery mechanism is invoked, one-time

access to the device without a password is enabled and all configuration

and user files are retained.