Huawei Quidway S2700 Series Configuration Manual page 59

Hide thumbs Also See for Quidway S2700 Series:
Table of Contents

Advertisement

Quidway S2700 Series Ethernet Switches
Configuration Guide - Basic Configuration
User Type
Telnet users
SSH users
FTP users
The rights that can be obtained by users logging in to the S2700 through Telnet, SSH, and FTP
depend on the priorities of the user interfaces through which they log in to. The S2700 provides
multiple services for a user. To ensure login convenience and security, login users must be
classified, and then assigned levels.
Priorities of Users
The system manages super users and Telnet users according to user levels.
Similar to the command levels, users are classified into 16 levels numbered 0 to 15. The greater
the number, the higher the user level.
The level of the command that a user can run is determined by the level of this user.
l
l
Users of a level can access the commands of this level or lower levels.
Assuming that user levels 0 to 3 are used in the system, users of level 2 can access commands
of levels 0, 1, and 2, and users of level 3 can access commands at all levels.
Authenticating Login Users
After users are configured on the S2700, the system authenticates the users when they log in to
the S2700. The S2700 provides three authentication modes, as shown in
Issue 01 (2011-07-15)
Description
Logs in to the S2700 through the Ethernet interface
using Telnet and have limited rights. A Telnet
connection is set up between the user terminal and the
S2700.
Logs in to the S2700 through the Ethernet interface
using SSH and have limited rights. An SSH
connection is set up between the user terminal and the
S2700.
Logs in to the S2700 through FTP on the Ethernet
interface and have limited rights. An FTP connection
is set up between the user terminal and the S2700.
NOTE
If the user levels are not set, the four default user levels are used, namely, levels 0 to 3.
In the case of non-authentication or password authentication, the level of the command that
the user can run depends on the level of the user interface.
In the case of AAA authentication, the command that the user can run depends on the level
of the local user specified in AAA configuration.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
5 User Management
Authentication
Recommended
Recommended
Recommended
Table
5-3.
48

Advertisement

Table of Contents
loading

Table of Contents