Dell 9.7(0.0) Laptop User Manual


  Open as PDF
of 1684
 
Version Description
8.3.19.0 Introduced on the S4820T.
8.3.11.1 Introduced on the Z9000.
8.3.7.0 Introduced on the S4810.
7.6.1.0 Introduced on the S-Series.
7.5.1.0 Introduced on the C-Series.
pre-6.1.1.0 Introduced on the E-Series.
Usage
Information
The software measures the period of inactivity defined in this command as the
period between consecutive keystrokes. For example, if your password is
“password” you can enter “p” and wait 29 seconds to enter the next letter.
username
Establish an authentication system based on user names.
Syntax
username name [access-class access-list-name] [nopassword |
{password | secret} [encryption-type] password] [privilege
level] [role role-name]
If you do not want a specific user to enter a password, use the nopassword
option.
To delete authentication for a user, use the no username name command.
Parameters
name Enter a text string for the name of the user up to 63
characters.
access-class
access-list-
name
Enter the keywords access-class then the name of a
configured access control list (either an IP access control list
or MAC access control list).
nopassword Enter the keyword nopassword to specify that the user
should not enter a password.
password Enter the keyword password then the encryption-type
or the password.
secret Enter the keyword secret then the encryption-type or
the password.
encryption-
type
Enter an encryption type for the password that you enter.
0 directs the system to store the password as clear text. It
is the default encryption type when using the password
option.
7 to indicate that a password encrypted using a DES
hashing algorithm follows. This encryption type is
available with the
password option only.
5 to indicate that a password encrypted using an MD5
hashing algorithm follows. This encryption type is
Security
1389