EasyManua.ls Logo

Cisco SCE2020-4XGBE-SM - Page 114

Cisco SCE2020-4XGBE-SM
512 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
5-20
Cisco SCE 2000 and SCE 1000 Software Configuration Guide
OL-7827-12
Chapter 5 Configuring the Management Interface and Security
Configuring the Available Interfaces
The following keywords are available:
nopassword — There is no password associated with this user
secret — the password is saved in MD5 encrypted form. Use with either of the following keywords
to indicate the format of the password as entered in the command:
0 — use with the password option to specify a clear text password that will be saved in MD5
encrypted form
5 — use with the encrypted-secret option to specify an MD5 encryption string that will be
saved as the user MD5-encrypted secret password
How to Add a User with a Clear Text Password
Step 1 From the SCE(config)# prompt, type username name password password and press Enter.
How to Add a User with No Password
Step 1 From the SCE(config)# prompt, type username name nopassword and press Enter.
How to Add a User with an MD5 Encrypted Password Entered in Clear Text
Step 1 From the SCE(config)# prompt, type username name secret 0 password and press Enter.
How to Add a User with an MD5 Encrypted Password Entered as an MD5 Encrypted String
Step 1 From the SCE(config)# prompt, type username name secret 5 encrypted-secret and press Enter.
Definingthe User Privilege Level
Privilege level authorization in the SCE platform is accomplished by the use of an " enable " command
authentication request. When a user requests an authorization for a specified privilege level, by using the
" enable " command, the SCE platform sends an authentication request to the TACACS+ server
specifying the requested privilege level. The SCE platform grants the requested privilege level only after
the TACACS+ server authenticates the " enable " command password and verifies that the user has
sufficient privileges the enter the requested privilege level.

Table of Contents

Related product manuals