beautypg.com

Configuration example, Network requirements, Network diagram – H3C Technologies H3C S5120 Series Switches User Manual

Page 60: Configuration procedure

background image

3-7

Note that if you configure not to authenticate the users, the command level available to users logging in

to a switch depends on both the authentication-mode none command and the user privilege level

level command, as listed in

Table 3-4

.

Table 3-4 Determine the command level when users logging in to switches are not authenticated

Scenario

Authentication

mode

User type

Command

Command level

The user privilege level level
command not executed

Level 0

None
(authentication-mod
e none
)

VTY users

The user privilege level level
command already executed

Determined by
the

level

argument

Configuration Example

Network requirements

Assume that you are a level 3 AUX user and want to perform the following configuration for Telnet users

logging in to VTY 0:

z

Do not authenticate users logging in to VTY 0.

z

Commands of level 2 are available to users logging in to VTY 0.

z

Telnet protocol is supported.

z

The screen can contain up to 30 lines.

z

The history command buffer can contain up to 20 commands.

z

The timeout time of VTY 0 is 6 minutes.

Network diagram

Figure 3-4 Network diagram for Telnet configuration (with the authentication mode being none)

Configuration procedure

# Enter system view, and enable the Telnet service.

system-view

[Sysname] telnet server enable

# Enter VTY 0 user interface view.

[Sysname] user-interface vty 0

# Configure not to authenticate Telnet users logging in to VTY 0.

[Sysname-ui-vty0] authentication-mode none

# Specify commands of level 2 are available to users logging in to VTY 0.

[Sysname-ui-vty0] user privilege level 2