Chapter 4 User Management; User Management Overview - Zte ZXR10 ZSR V2 Configuration Manual (System Management

Intelligent integrated multi-service router
Hide thumbs Also See for ZXR10 ZSR V2:
Table of Contents

Advertisement

Chapter 4
User Management
Table of Contents

User Management Overview ......................................................................................4-1

Configuring User Management...................................................................................4-2
User Management Configuration Examples................................................................4-7
4.1 User Management Overview
To maintain and manage the ZXR10 ZSR V2, users need to log in to it in SSH, Telnet,
or FTP mode. User management implements the configuration, authentication, and
authorization of users who have logged in to the ZXR10 ZSR V2.
The user-name command is used to configure or delete users. By running the user-name
command, you can configure user names and passwords (clear text passwords of 3–32
bits long or cipher text passwords of 64 bits long).
By configuring functions related to Authentication, Authorization and Accounting (AAA),
user management provides user authentication and authorization in the following modes:
l
None-authentication and none-authorization
l
Local authentication and authorization
l
Remote Authentication Dial In User Service (RADIUS) authentication and
authorization
l
Terminal Access Controller Access-Control System Plus (TACACS+) authentication
and authorization
l
RADIUS hybrid authentication and authorization
l
TACACS+ hybrid authentication and authorization
When a user logs in to the ZXR10 ZSR V2 through SSH, Telnet, or FTP, user management
queries the authentication template corresponding to the user to obtain the authentication
mode, and authenticates the user. If the authentication is passed, the user is authorized.
If the authentication is failed, user management returns failure information.
After the user passes the authentication, user management authorizes the user. After
the user successfully logs in and is authorized, user management displays a command
view according to the user's privilege level. Therefore, the user cannot view or run
commands with privilege levels higher than the user's privilege level, but can view and
run commands with privilege levels lower than and equal to the user's privilege level. The
local-privilege-level command is used to set user privilege levels, which range from
level 0 (the lowest level) to level 15 (the highest level), and are level 0 by default.
SJ-20140504150128-007|2014-05-10 (R1.0)
4-1
ZTE Proprietary and Confidential

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents