H3C Technologies H3C SecPath F1000-E User Manual
Page 207
13
To do…
Use the command…
Remarks
Using remote
authentication
(RADIUS,
HWTACACS,
and LDAP
authentications)
Configure user level on the
authentication server
•
For remote authentication, if
you do not configure the user
level, the user level depends on
the default configuration of the
authentication server.
NOTE:
•
For more information about user interfaces, see
User Interface Configuration in the System Volume. For
more information about the user-interface, authentication-mode and user privilege level commands, see
User Interface Commands in the System Volume.
•
For more information about AAA authentication, see
RADIUS Configuration in the Firewall Web
Configuration Manual.
•
For more information about SSH, see
SSH 2.0 Configuration in the Security Volume.
Example of configuring user privilege level by using AAA authentication parameters
# Authenticate the users that telnet to the device through VTY 1, verify their usernames and passwords
locally, and specify the user privilege level as 3.
[Sysname] user-interface vty 1
[Sysname-ui-vty1] authentication-mode scheme
[Sysname-ui-vty1] quit
[Sysname] local-user test
[Sysname-luser-test] password cipher 123
[Sysname-luser-test] service-type telnet
After the above configuration, when users telnet to the device through VTY 1, they need to input username
test and password 123. After passing the authentication, users can only use the commands of level 0.
If the users need to use commands of levels 0, 1, 2 and 3, the following configuration is required:
[Sysname-luser-test] authorization-attribute level 3
Configure the user privilege level under a user interface
•
If the user interface authentication mode is scheme when a user logs in, and SSH publickey
authentication type (only username is needed for this authentication type) is adopted, then the user
privilege level is the user interface level;
•
If a user logs in by using the none or password mode (namely, no username is needed), the user
privilege level is the user interface level.
Follow these steps to configure the user privilege level under a user interface (SSH publickey
authentication type):