User manual

Version Description
pre-6.1.1.0 Introduced on the E-Series.
Usage
Information
The software measures the period of inactivity defined in this command as the
period between consecutive keystrokes. For example, if your password is
“password” you can enter “p” and wait 29 seconds to enter the next letter.
username
Establish an authentication system based on user names.
Syntax
username name [access-class access-list-name] [nopassword |
{password | secret} [encryption-type] password] [privilege
level] [role role-name]
If you do not want a specific user to enter a password, use the nopassword
option.
To delete authentication for a user, use the no username name command.
Parameters
name Enter a text string for the name of the user up to 63
characters.
access-class
access-list-
name
Enter the keywords access-class then the name of a
configured access control list (either an IP access control list
or MAC access control list).
nopassword Enter the keyword nopassword to specify that the user
should not enter a password.
password Enter the keyword password then the encryption-type
or the password.
secret Enter the keyword secret then the encryption-type or
the password.
encryption-
type
Enter an encryption type for the password that you enter.
0 directs the system to store the password as clear text. It
is the default encryption type when using the password
option.
7 to indicate that a password encrypted using a DES
hashing algorithm follows. This encryption type is
available with the
password option only.
5 to indicate that a password encrypted using an MD5
hashing algorithm follows. This encryption type is
available with the
secret option only, and is the default
encryption type for this option.
password Enter a string up to 32 characters long.
privilege level Enter the keyword privilege then a number from zero (0)
to 15.
Security
1603