R1#login
Username:recover-user who
question: who are you
answer:
Please input your new password:
Re-enter New password:
The password has been changed successfully,
please remember your new password!
Username:who
Password:
R1#
Note:
Note: If the input answer to the password prompt is correct, user who's password is
changed to a new password.
4.3.5 Configuring OAM Security Management
Configuration Description
As shown in
port or Telnet. The user enters configuration mode to create an authentication user. To
prevent user passwords from being cracked or stolen, the ZXR10 ZSR V2 supports setting
password strength. A user who fails authentication consecutively is locked and forbidden
to log in within a given period of time, so that the user cannot try to crack the password
through repeated login attempts.
Figure 4-5 Configuring OAM Security Management
Configuration Flow
1. Configure password strength.
2. Create a user. Only if the password strength meets the requirements, can the creation
succeed.
3. Configure an authentication template.
4. Configure an authorization template.
5. Configure the number of consecutive user authentication failure times and locking
period.
SJ-20140504150128-007|2014-05-10 (R1.0)
/*The input answer is not displayed.*/
Figure
4-5, a user logs in to the ZXR10 ZSR V2 from a PC through a serial
4-13
ZTE Proprietary and Confidential
Chapter 4 User Management