Users Guide

Table Of Contents
lockout-period minutes Sets the amount of time that a user ID is prevented from accessing the system after
exceeding the maximum number of failed login attempts, from 0 to 43,200; default 5.
NOTE: Dell Technologies recommends that you configure the lockout period to be a nonzero value. If you set this
value to zero, no lockout period is configured. Any number of failed login attempts do not lock out a user.
console-exemptApplicable only if the user lockout feature is enabled. Enables the user to log in through the
console, even though the user ID is blocked because of an existing lockout.
When a user is locked out due to exceeding the maximum number of failed login attempts, other users can still access the
switch.
Configure user lockout
OS10(config)# password-attributes max-retry 4 lockout period 360 console-exempt
Simple password check
By default, OS10 uses a strong password check when you configure user name passwords with the username username
password password role role [priv-lvl privilege-level] command.
To turn off the strong password check and configure simpler passwords with no restrictions, use the service simple-
password command.
To disable the simple password check and return to the default strong password check, use the no service simple-
password command.
Enter the command in CONFIGURATION mode.
service simple-password
Enable simple password check
OS10(config)# username abhishek password madmiamadam role sysadmin
%Error: Password fail: it does not contain enough DIFFERENT characters
OS10(config)# service simple-password
OS10(config)# username abhishek password madmiamadam role sysadmin
OS10(config)#
Password strength
By default, the password you configure with the username password role and enable password priv-lvl
commands must be at least nine alphanumeric characters. To increase password strength, you can create stronger password
rules using the password-attributes command. These password rules apply to the user name and privilege-level password
configuration.
When you enter the command, at least one parameter is required. When you enter the character-restriction parameter,
at least one option is required.
Create rules for stronger passwords in CONFIGURATION mode.
password-attributes {[min-length number] [character-restriction {[upper number]
[lower number][numeric number] [special-char number]}}
min-length number Enter the minimum number of required alphanumeric characters, from 6 to 32; default 9.
character-restriction Enter a requirement for the alphanumeric characters in a password:
upper number Minimum number of uppercase characters required, from 0 to 31; default 0.
lower number Minimum number of lowercase characters required, from 0 to 31; default 0.
numeric number Minimum number of numeric characters required, from 0 to 31; default 0.
special-char number Minimum number of special characters required, from 0 to 31; default 0.
To turn off the strong password check enabled with the password-attributes command, use the service simple-
password command. No password rules, except for the minimum 9-character requirement, are applied to the user name
and privilege-level passwords. To revert to the configured password-attributes settings, use the no service simple-
password command.
1306
Security