H3C S5120-SI Series Operation Manual page 609

Hide thumbs Also See for S5120-SI Series:
Table of Contents

Advertisement

Perform no authentication to the users telnetting to the device, and specify the user privilege level
as 1. (This configuration brings potential security problem. Therefore, you are recommended to use
it only in a lab environment.)
<Sysname> system-view
[Sysname] user-interface vty 0 4
[Sysname-ui-vty0-4] authentication-mode none
[Sysname-ui-vty0-4] user privilege level 1
By default, when users telnet to the device, they can only use the following commands after passing the
authentication:
<Sysname> ?
User view commands:
cluster
Run cluster command
display
Display current system information
ping
Ping function
quit
Exit from current command view
ssh2
Establish a secure shell client connection
super
Set the current user priority level
telnet
Establish one TELNET connection
tracert
Trace route function
After you set the user privilege level under the user interface, users can log in to the device through
Telnet without any authentication and use the following commands:
<Sysname> ?
User view commands:
cluster
Run cluster command
debugging
Enable system debugging functions
display
Display current system information
ping
Ping function
quit
Exit from current command view
reset
Reset operation
screen-length
Specify the lines displayed on one screen
send
Send information to other user terminal interface
ssh2
Establish a secure shell client connection
super
Set the current user priority level
telnet
Establish one TELNET connection
terminal
Set the terminal line characteristics
tracert
Trace route function
undo
Cancel current setting
Authenticate the users logging in to the device through Telnet, verify their passwords, and specify
the user privilege levels as 2.
<Sysname> system-view
[Sysname] user-interface vty 0 4
[Sysname-ui-vty1] authentication-mode password
[Sysname-ui-vty0-4] set authentication password cipher 123
[Sysname-ui-vty0-4] user privilege level 2
By default, when users log in to the device through Telnet, they can use the commands of level 0 after
passing the authentication. After you set the user privilege level under the user interface, when users
1-13

Advertisement

Table of Contents
loading

Table of Contents