32
C
1: G
HAPTER
ETTING
S
TARTED
Login users are also classified into four levels that correspond to the four
command levels respectively. After users of different levels log in, they can only use
commands at the levels that are equal to or lower than their own level.
To prevent unauthorized users from illegal intrusion, the user will be identified
when switching from a lower level to a higher level with the
command. User ID authentication is performed when users at lower level become
users at a higher level. In other words, the user password for the higher level is
needed. (Suppose the user has entered
}
|
password
cipher
cannot see the password that they entered. Only when correct password is input
three times, can the user switch to the higher level. Otherwise, the original user
level will remain unchanged.
Different command views are implemented according to different requirements.
They are related to one another. For example, after logging in to the Switch, you
will enter User View, in which you can only use some basic functions such as
displaying the running state and statistics information. In User View, enter
to enter System View, in which you can key in different
system-view
configuration commands and enter the corresponding views.
The command line provides the following views:
User View
■
System View
■
Ethernet Port View
■
VLAN View
■
VLAN Interface View
■
Local-User View
■
User Interface View
■
FTP Client View
■
RSA Public Key View
■
RSA Key Code View
■
PIM View
■
RIP View
■
OSPF View
■
OSPF Area View
■
Route Policy View
■
Basic ACL View
■
Advanced ACL View
■
Layer-2 ACL View
■
User-Defined ACL View
■
QoS Profile View
■
RADIUS Server Group View
■
ISP Domain View
■
super password
..) For the sake of confidentiality, on the screen the user
[
]
super
level
] {
[
level
level
simple