Security Management And Password Configuration - D-Link xStack DES-3228PA Web/Installation Manual

Layer 2 stackable 10/100mbps ethernet switch with poe
Hide thumbs Also See for xStack DES-3228PA:
Table of Contents

Advertisement

DES-3228PA Embedded Web System User Guide
Note
When the device reboot begins, any input at the ASCII terminal or keyboard automatically cancels the
BOOTP process before completion and the device does not receive an IP address from the BOOTP
server.
The following example illustrates the process:
Console>
enable
Console#
delete startup-config
Startup file was deleted
Console#
reload
You haven't saved your changes. Are you sure you want to continue (y/n)[n]?
This command will reset the whole system and disconnect your current session.Do you want to
continue (y/n)[n]?
******************************************************
/*the device reboots */
To verify the IP address, enter the show ip interface command. The device is now configured with an IP address.

Security Management and Password Configuration

System security is handled through the AAA mechanism that manages user access rights, privileges, and man-
agement methods. AAA uses both local and remote user databases. Data encryption is handled through the SSH
mechanism.
The system is delivered with no default password configured; all passwords are user-defined. If a user-defined
password is lost, a password recovery procedure can be invoked from the Startup menu. The procedure is appli-
cable for the local terminal only and allows a one-time access to the device from the local terminal with no pass-
word entered.
Configuring Security Passwords Introduction
The security passwords can be configured for the following services:
Console
Telnet
SSH
HTTP
HTTPS
Passwords are user-defined.
When creating a user name, the default priority is "1," which allows access but not configuration rights. A priority of
"15" must be set to enable access and configuration rights to the device. Although user names can be assigned
privilege level 15 without a password, it is recommended to always assign a password. If there is no specified
password, privileged users can access the Web interface with any password.
Page 31

Advertisement

Table of Contents
loading

Table of Contents