Function
Description
Application
Encrypted display: The switch protects the displayed
password. The password is always displayed as a string
containing only asterisks (*) in the configuration file or on
user terminal.
Password
protection and
encryption
Saving passwords in ciphertext: The switch encrypts and
saves the configured passwords in ciphertext in the
configuration file.
All passwords
Login attempt limitation: You can use this function to
enable the switch to limit the number of login attempts
allowed for each user.
Inhibit the user from re-logging in
within a certain time period. After
the period, the user is allowed to
log into the switch again.
Inhibit the user from re-logging in
forever. The user is allowed to
log into the switch again only
ter the administrator manually
removes the user from the user
blacklist.
af
Login attempt
limitation and
failure
processing.
If the number of login
attempts exceeds the
configured maximum
number, the user
fails to log in. In this
case, the switch
provides three failure
processing modes.
By default, the switch
adopts the first
mode, but you can
actually specify the
processing mode as
needed.
Allow the user to log in again
without any inhibition.
Telnet and SSH
passwords
User blacklist
If the maximum number of attempts is exceeded, the
user cannot log into the switch and is added to the
blacklist by the switch. All users in the blacklist are not
allowed to log into the switch.
z
For the user inhibited from logging in for a certain time
period, the switch will remove the user from the
blacklist when the time period expires.
z
For the user inhibited from logging in forever, the
switch provides a command which allows the
administrator to manually remove the user from the
blacklist.
z
The blacklist is saved in the RAM of the switch, so it
will be lost when the switch reboots.
—
System log
function
The switch automatically records the following events in
logs:
z
Successful user login. The switch records the user
name, user IP address, and VTY ID.
z
Inhibition of a user due to ACL rule. The switch
records the user IP address.
z
User authentication failure. The switch records the
user name, user IP address, VTY ID, and failure
reason.
No configuration is
needed for this
function.