login

system login
SDE M10-Smart M2 RS420 AresC640

User login

system login aaa
SDE M10-Smart M2 RS420 AresC640

AAA options

system login aaa accounting <id>
SDE M10-Smart M2 RS420 AresC640

Accounting list name

Reference:

system aaa list <id>

system login aaa authentication <id>
SDE M10-Smart M2 RS420 AresC640

Authentication list name

Reference:

system aaa list <id>

SDE M10-Smart M2 RS420 AresC640

System login banners

SDE M10-Smart M2 RS420 AresC640
Values:
  • id

    Display a message after login

    Example: “Welcome to OSDx!”

SDE M10-Smart M2 RS420 AresC640
Values:
  • id

    Display a message before login

    Example: “Warning: do not use this system without proper permissions.”

system login idle-timeout <u32>
SDE M10-Smart M2 RS420 AresC640

Timeout interval in seconds

Values:
  • u32 – Disabled (infinite timeout timer) (0)

  • u32 – Seconds (1-65535)

system login max-auth-tries <u32>
SDE M10-Smart M2 RS420 AresC640

Maximum number of authentication attempts allowed per connection

Values:
  • u32 – Number of attempts (1-65535)

system login role <txt>
SDE M10-Smart M2 RS420 AresC640

User role

Values:
  • txt – Role name (1-32)

Instances:

Multiple

Required:

system login role <txt> authentication
SDE M10-Smart M2 RS420 AresC640

Authentication for role members

system login role <txt> authentication public-key <id>
SDE M10-Smart M2 RS420 AresC640
Values:
  • id

    Public key attached to this role

    The key-based authentication involves two files: a public key and a private key. The first one is used for encrypting communications with a client that presumably owns the private key. As the private key should be owned only by a group or an individual, communications are always secure and the identity of the peers is always known. This is the so-called asymmetric encryption.

Instances:

Multiple

system login role <txt> level <u32>
SDE M10-Smart M2 RS420 AresC640

Role privilege level

Values:
  • u32 – Privilege level (0-15)

system login unlock-time <u32>
SDE M10-Smart M2 RS420 AresC640

Time until an account that has hit the maximum number of athentication attemps is unlocked

Values:
  • u32 – Time in seconds (0-65535)

system login user <txt>
SDE M10-Smart M2 RS420 AresC640

User account information

Values:
  • txt – User name (1-32)

Instances:

Multiple

Required:

system login user <txt> authentication
SDE M10-Smart M2 RS420 AresC640

Authentication password

Required:

system login user <txt> authentication encrypted-password <txt>
SDE M10-Smart M2 RS420 AresC640
Values:
  • txt – Encrypted password for this user

system login user <txt> authentication public-key <id>
SDE M10-Smart M2 RS420 AresC640
Values:
  • id

    Public key attached to this user

    The key-based authentication involves two files: a public key and a private key. The first one is used for encrypting communications with a client that presumably owns the private key. As the private key should be owned only by a group or an individual, communications are always secure and the identity of the peers is always known. This is the so-called asymmetric encryption.

Instances:

Multiple

system login user <txt> role <id>
SDE M10-Smart M2 RS420 AresC640
Values:
  • id – User role