Configuring Oam Security Management; Figure 4-5 Configuring Oam Security Management - Zte ZXR10 ZSR V2 Configuration Manual (System Management

Intelligent integrated multi-service router
Hide thumbs Also See for ZXR10 ZSR V2:
Table of Contents

Advertisement

R1#login
Username:recover-user who
question: who are you
answer:
Please input your new password:
Re-enter New password:
The password has been changed successfully,
please remember your new password!
Username:who
Password:
R1#
Note:
Note: If the input answer to the password prompt is correct, user who's password is
changed to a new password.

4.3.5 Configuring OAM Security Management

Configuration Description
As shown in
port or Telnet. The user enters configuration mode to create an authentication user. To
prevent user passwords from being cracked or stolen, the ZXR10 ZSR V2 supports setting
password strength. A user who fails authentication consecutively is locked and forbidden
to log in within a given period of time, so that the user cannot try to crack the password
through repeated login attempts.

Figure 4-5 Configuring OAM Security Management

Configuration Flow
1. Configure password strength.
2. Create a user. Only if the password strength meets the requirements, can the creation
succeed.
3. Configure an authentication template.
4. Configure an authorization template.
5. Configure the number of consecutive user authentication failure times and locking
period.
SJ-20140504150128-007|2014-05-10 (R1.0)
/*The input answer is not displayed.*/
Figure
4-5, a user logs in to the ZXR10 ZSR V2 from a PC through a serial
4-13
ZTE Proprietary and Confidential
Chapter 4 User Management

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents