BLADE OS™ Application Guide HP GbE2c Ethernet Blade Switch for c-Class BladeSystem Version 5.1 Advanced Functionality Software
Table Of Contents
- Contents
- Figures
- Tables
- Preface
- Part 1: Basic Switching
- Accessing the Switch
- The Management Network
- Local Management Using the Console Port
- The Command Line Interface
- Remote Management Access
- Client IP Address Agents
- Securing Access to the Switch
- Setting Allowable Source IP Address Ranges
- RADIUS Authentication and Authorization
- TACACS+ Authentication
- LDAP Authentication and Authorization
- Secure Shell and Secure Copy
- Configuring SSH/SCP Features on the Switch
- Configuring the SCP Administrator Password
- Using SSH and SCP Client Commands
- SSH and SCP Encryption of Management Messages
- Generating RSA Host and Server Keys for SSH Access
- SSH/SCP Integration with Radius Authentication
- SSH/SCP Integration with TACACS+ Authentication
- End User Access Control
- Ports and Trunking
- Port-Based Network Access Control
- VLANs
- Spanning Tree Protocol
- RSTP and MSTP
- Link Layer Discovery Protocol
- Quality of Service
- Accessing the Switch
- Part 2: IP Routing
- Basic IP Routing
- Routing Information Protocol
- IGMP
- OSPF
- OSPF Overview
- OSPF Implementation in BLADE OS
- OSPF Configuration Examples
- Remote Monitoring
- Part 3: High Availability Fundamentals
- High Availability
- Layer 2 Failover
- Server Link Failure Detection
- VRRP Overview
- Failover Methods
- BLADE OS Extensions to VRRP
- Virtual Router Deployment Considerations
- High Availability Configurations
- High Availability
- Part 4: Appendices
- Index

BLADE OS 5.1 Application Guide
62 Chapter 1: Accessing the Switch BMD00113, September 2009
Defining User Names and Passwords
Use the User ID menu to define user names and passwords.
Defining a User’s Access Level
The end user is by default assigned to the user access level (also known as class of service, or CoS).
CoS for all user accounts have global access to all resources except for User CoS, which has access
to view only resources that the user owns. For more information, see Table 2 on page 30.
To specify the user’s level, use the following command:
Validating a User’s Configuration
From the user ID menu (/cfg/sys/access/user/uid <user ID>), enter the cur
command:
Enabling or Disabling a User
An end user account must be enabled before the switch recognizes and permits login under the
account. Once enabled, the switch requires any user to enter both username and password.
>> User ID 1 # name user1 (Assign name to user ID 1)
Current user name:
New user name: user1
>> User ID 1 # pswd (Assign password to user ID 1)
Changing user1 password; validation required:
Enter current admin password: <current administrator password>
Enter new user1 password: <new user password>
Re-enter new user1 password: <new user password>
New user1 password accepted.
>> User ID 1 # cos user|oper|admin
>> User ID 2 # cur
name jane , dis, cos user , password valid, offline
>> # /cfg/sys/access/user/uid <user ID>/ena
>> # /cfg/sys/access/user/uid <user ID>/dis