beautypg.com

H3C Technologies H3C S12500 Series Switches User Manual

Page 67

background image

55

Step Command

Remarks

1.

Enter system view.

system-view

N/A

2.

Enter user interface view.

user-interface { first-num1
[ last-num1 ] | { aux | console |

vty } first-num2 [ last-num2 ] }

N/A

3.

Enable password

authentication.

authentication-mode password

The default is password for VTY
and AUX logins and none for
console login.

4.

Set the local authentication

password.

set authentication password

[ hash ] { cipher | simple }
password

No local authentication password
is set by default.
This command is not supported in
FIPS mode.

To configure the authentication mode as scheme (local authentication):

Step Command

Remarks

1.

Enter system view.

system-view

N/A

2.

Enter user interface view.

user-interface { first-num1
[ last-num1 ] | { aux | console |

vty } first-num2 [ last-num2 ] }

N/A

3.

Enable scheme

authentication.

authentication-mode scheme

The default is password for VTY
and AUX logins and none for
console login.

4.

Set the user privilege level.

See "

Configuring a user privilege

level for user interfaces

."

Optional.
By default, console users have a
privilege level of 3, and other users

have a privilege level of 0.

5.

Exit to system view.

quit

N/A

6.

Create a local user and enter
local user view.

local-user

user-name

By default, no local user exists.

7.

Set the authentication

password.

password { cipher | simple }
password

N/A

8.

Assign services.

service-type { ssh | telnet |
terminal } *

VTY users use Telnet or SSH
service. Console or AUX users use

terminal service.

9.

Configure user attributes.

authorization-attribute { acl
acl-number | callback-number
callback-number | idle-cut minute

| level level | user-profile

profile-name | vlan vlan-id |
work-directory directory-name } *

Optional.
By default, FTP/SFTP users can

access the switch's root directory
with the user level 0.

For more information about the local-user, password, service-type, and authorization-attribute

commands, see Security Command Reference.