Password Control Configuration
289
Password Control
Configuration
Configuration
Prerequisites
A user PC is connected to the S3200 switches to be configured; both devices are
operating normally.
Configuration Tasks
The following sections describe the configuration tasks for password control:
■
Configuring Password Aging
■
Configuring the Minimum Password Length
■
Configuring History Password Recording
■
Configuring User Login Password in Encryption Mode
■
Configuring Login Attempts Limitation and Failure Procession Mode
■
Configuring the Timeout for User Password Authentication
After the above configuration, you can execute the
display password-control
command in any view to check the information about the global password control
for all users, including the enable/disable state of password aging, the aging time,
the enable/disable state of the shortest-password limitation, the configured
User blacklist
If the maximum attempt times is
exceeded, the user cannot log in the
switch and is added to the blacklist
by the switch. All users in the
blacklist are not allowed to log in
the switch.
For the user inhibited from login for
a certain time period, the switch will
remove the user from the blacklist
when the time period is used out.
For the user inhibited from login
forever, the switch provides a
command which allows the
administrator to manually remove
the user from the blacklist.
The blacklist is saved in the RAM of
the switch, so it will be lost when
the switch reboots.
System logging
The switch automatically logs the
following events:
■
Successful user login: The switch
logs the user name, user IP
address, and VTY ID.
■
Inhibition of a user due to ACL
rule: The switch logs the user IP
address.
■
User authentication failure. The
switch logs the user name, user
IP address, VTY ID, and failure
reason.
No configuration is needed for
this function
Table 335
Functions Provided by Password Control
Function
Description
Application
Summary of Contents for 400 Family
Page 12: ......
Page 16: ...14 ABOUT THIS GUIDE ...
Page 58: ...56 CHAPTER 2 PORT OPERATION ...
Page 68: ...66 CHAPTER 3 VLAN OPERATION ...
Page 98: ...96 CHAPTER 5 NETWORK PROTOCOL OPERATION ...
Page 124: ...122 CHAPTER 6 IP ROUTING PROTOCOL OPERATION ...
Page 156: ...154 CHAPTER 8 ACL CONFIGURATION ...
Page 218: ...216 CHAPTER 11 802 1X CONFIGURATION ...
Page 298: ...296 CHAPTER 13 PASSWORD CONTROL CONFIGURATION OPERATIONS ...
Page 336: ...334 APPENDIX B RADIUS SERVER AND RADIUS CLIENT SETUP ...