EasyManua.ls Logo

Cisco SCE2020-4XGBE-SM - Configuring AAA Login Authentication

Cisco SCE2020-4XGBE-SM
512 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
5-22
Cisco SCE 2000 and SCE 1000 Software Configuration Guide
OL-7827-12
Chapter 5 Configuring the Management Interface and Security
Configuring the Available Interfaces
The following keywords are available:
secret — the password is saved in MD5 encrypted form. Use with either of the following keywords
to indicate the format of the password as entered in the command:
0 — use with the password option to specify a clear text password that will be saved in MD5
encrypted form
5 = use with the encrypted-secret option to specify an MD5 encryption string that will be saved
as the user MD5-encrypted secret password
How to Add a User with a Privilege Level and a Clear Text Password
Step 1 From the SCE(config)# prompt, type username name privilege level password password and press
Enter.
How to Add a User with a Privilege Level and an MD5 Encrypted Password Entered in Clear Text
Step 1 From the SCE(config)# prompt, type username name privilege level secret 0 password and press
Enter.
How to Add a User with a Privilege Level and an MD5 Encrypted Password Entered as an MD5 Encrypted String
Step 1 From the SCE(config)# prompt, type username name privilege level secret 5 encrypted-secret and
press Enter.
How to Delete a User
Options
The following options are available:
name name of the user to be deleted
Step 1 From the SCE(config)# prompt, type no username name and press Enter.
Configuring AAA Login Authentication
There are two features to be configured for login authentication:
Maximum number of permitted Telnet login attempts
The authentication methods used at login (see General AAA Fallback and Recovery Mechanism.)
The procedures for configuring login authentication are explained in the following sections:
Configuring Maximum Login Attempts, page 5-23
Configuring the Login Authentication Methods, page 5-23

Table of Contents

Related product manuals