17
Ste
Command
Remarks
Configure the privilege level for
users that log in through the current
user interface
user privilege level level
Optional
By default, the user privilege level
for users logged in through the
AUX user interface is 3, and that
for users logged in through the VTY
interfaces is 0.
To configure the user privilege level under a user interface (none or password authentication mode):
Ste
Command
Remarks
Enter system view system-view —
Enter user interface view
user-interface { first-num1
[ last-num1 ] | { aux | vty }
first-num2 [ last-num2 ] }
—
Configure the authentication mode
for any user who uses the current
user interface to log in to the switch
authentication-mode { none |
password }
Optional
By default, the authentication
mode for VTY user interfaces is
password, and no authentication is
needed for AUX login user.
Configure the privilege level of
users logged in through the current
user interface
user privilege level level
Optional
By default, the user privilege level
for users logged in through the
AUX user interface is 3, and that
for users logged in through the VTY
interfaces is 0.
Example of configuring a user privilege level under a user interface
# Authenticate users logged in to the switch through Telnet, verify their password, and specify their user
privilege level as 2.
<Sysname> system-view
[Sysname] user-interface vty 0 15
[Sysname-ui-vty0-15] authentication-mode password
[Sysname-ui-vty0-15] set authentication password cipher 123
[Sysname-ui-vty0-15] user privilege level 2
By default, Telnet users can use the commands of level 0 after passing authentication. After the configuration
above is completed, when users log in to the switch through Telnet, they must enter password 12 3, and then
they can use commands of levels 0, 1, and 2.
NOTE:
• For more information about user interfaces, see “Logging in to the switch configuration.” For more
information about user-interface, authentication-mode, and user privilege level, see “Logging in to
the switch commands.”
• For more information about AAA authentication, see Security Configuration Guide. For more
information about local-user and authorization-attribute, see Security Command Reference.
• For more information about SSH, see Security Configuration Guide.