HP 6125XLG R2306-HP 6125XLG Blade Switch Fundamentals Configuration Guide - Page 28

Login authentication modes, User roles, Password, Scheme, Configuration tasks

Page 28 highlights

A relative number uniquely identifies a user interface among all user interfaces that are the same type. The number format is user interface type + number. Both types of user interfaces are numbered starting from 0 and incrementing by 1. For example, the first VTY user interface is VTY 0. Login authentication modes You can configure login authentication to prevent illegal access to the device CLI. The device supports the following login authentication modes: • None-Disables authentication. This mode allows access without authentication and is insecure. • Password-Requires password authentication. • Scheme-Uses the AAA module to provide local or remote login authentication. You must provide a username and password at login. If your password for remote authentication was lost, contact the server administrator for help. In FIPS mode, the device supports only the scheme mode. Different login authentication modes require different configurations on the user interfaces, as shown in Table 8. Table 9 Configuration required for different login authentication modes Authentication mode None Password Scheme Configuration tasks Set the authentication mode to none. 1. Set the authentication mode to password. 2. Set a password. 1. Set the authentication mode to scheme. 2. Configure login authentication methods in ISP domain view. For more information, see Security Configuration Guide. User roles A user is assigned one or more user roles at login, and a user can access only commands permitted by the assigned user roles. For more information about user roles, see "Configuring RBAC." The device assigns user roles based on the login authentication mode and login method: • If none or password authentication is used, the device assigns user roles according to the user role configuration made on the user interface. • If scheme authentication is used: { For an SSH login user who uses publickey or password-publickey authentication, the device assigns user roles according to the user role configuration made on the user interface. { For other users, the device assigns user roles according to the user role configuration made on the AAA module. For remote AAA authentication users, if the AAA server does not assign any user role to a user and the default user role function is disabled, the user cannot log in. 21

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155

21
A relative number uniquely identifies a user interface among all user interfaces that are the same type.
The number format is
user interface type
+
number
. Both types of user interfaces are numbered starting
from 0 and incrementing by 1. For example, the first VTY user interface is VTY 0.
Login authentication modes
You can configure login authentication to prevent illegal access to the device CLI.
The device supports the following login authentication modes:
None
—Disables authentication. This mode allows access without authentication and is insecure.
Password
—Requires password authentication.
Scheme
—Uses the AAA module to provide local or remote login authentication. You must provide
a username and password at login. If your password for remote authentication was lost, contact the
server administrator for help.
In FIPS mode, the device supports only the scheme mode.
Different login authentication modes require different configurations on the user interfaces, as shown
in
Table 8
.
Table 9
Configuration required for different login authentication modes
Authentication mode
Configuration tasks
None
Set the authentication mode to
none
.
Password
1.
Set the authentication mode to
password
.
2.
Set a password.
Scheme
1.
Set the authentication mode to
scheme
.
2.
Configure login authentication methods in ISP domain view. For more
information, see
Security Configuration Guide
.
User roles
A user is assigned one or more user roles at login, and a user can access only commands permitted by
the assigned user roles. For more information about user roles, see "
Configuring RBAC
."
The device assigns user roles based on the login authentication mode and login method:
If none or password authentication is used, the device assigns user roles according to the user role
configuration made on the user interface.
If scheme authentication is used:
{
For an SSH login user who uses publickey or password-publickey authentication, the device
assigns user roles according to the user role configuration made on the user interface.
{
For other users, the device assigns user roles according to the user role configuration made on
the AAA module. For remote AAA authentication users, if the AAA server does not assign any
user role to a user and the default user role function is disabled, the user cannot log in.