3Com Switch 7750 Configuration Guide Guide

818 CHAPTER 78: PASSWORD CONTROL CONFIGURATION OPERATIONS
Password protection
and encryption
Encrypted display: The switch protects the
displayed password. The password is always
displayed as a string containing only asterisks
(*) in the configuration file or on user
terminal.
All passwords
Saving passwords in ciphertext: The switch
encrypts and saves the configured passwords
in ciphertext in the configuration file.
Login attempt
limitation and failure
processing.
Login attempt limitation: You can use this
function to enable the switch to limit the
number of login attempts allowed for each
user.
All passwords
If the number of login
attempts exceeds the
configured maximum
number, the user fails
to log in. In this case,
the switch provides
three failure
processing modes.
By default, the switch
adopts the first mode,
but you can actually
specify the processing
mode as needed.
Inhibit the user from
re-logging in within a
certain time period.
After the period, the
user is allowed to log
into the switch again.
All passwords
Inhibit the user from
re-logging in forever.
The user is allowed to
log into the switch
again only after the
administrator
manually removes the
user from the user
blacklist.
Telnet, SSH, and FTP
passwords
Allow the user to log
in again without any
inhibition.
User blacklist
If the maximum number of attempts is
exceeded, the user cannot log into the switch
and is added to the blacklist by the switch. All
users in the blacklist are not allowed to log
into the switch.
For the user inhibited from logging in for a
certain time period, the switch will remove
the user from the blacklist when the time
period expires.
For the user inhibited from logging in
forever, the switch provides a command
which allows the administrator to manually
remove the user from the blacklist.
The blacklist is saved in the RAM of the
switch, so it will be lost when the switch
reboots.
-
System log function
The switch automatically records the
following events in logs:
Successful user login. The switch records
the user name, user IP address, and VTY
ID.
Inhibition of a user due to ACL rule. The
switch records the user IP address.
User authentication failure. The switch
records the user name, user IP address,
VTY ID, and failure reason.
No configuration is
needed for this
function.
Table 631 Functions provided by password control
Function Description Application