30
31
5.1.2.2 Dening Line Passwords
Network administrators can define line passwords in the Line Password Page. After the line password is defined, a
management method is assigned to the password. The device can be accessed using the following methods:
Console Passwords
Telnet Passwords
Secure Telnet Passwords
To congure line passwords:
1. Click System > Management Security > Passwords > Line Password. The Line Password Page opens:
Figure 41: Line Password Page
The Line Password Page contains the following elds:
Console Line Password — Denes the line password
for accessing the device via a Console session. Pass-
words can contain a maximum of 159 characters.
Telnet Line Password — Denes the line password
for accessing the device via a Telnet session. Pass-
words can contain a maximum of 159 characters.
Secure Telnet Line Password — Defines the line password for accessing the device via a secure Telnet session.
Passwords can contain a maximum of 159 characters.
Conrm Password — Conrms the new line password. The password appears in the ***** format.
2. Dene the Console Line Password, Telnet Line Password, and Secure Telnet Line Password elds.
3. Redene the Conrm Password eld for each of the passwords dened in the previous steps to verify the passwords.
4. Click . Line password is congured and device is updated.
5.1.2.3 Dening Enable Passwords
The Enable Password Page sets a local password for a particular access level.
To enable passwords:
1. Click System > Management Security > Passwords > Enable Password. The Enable Password Page opens:
Figure 42: Enable Password Page
The Enable Password Page contains the following elds:
Enable Access Level — Defines the access level
associated with the enable password. Possible field
val-ues are 1-15.
Password — Denes the enable password.
Confirm Password — Confirms the new enable
password. The password appears in the ***** format.
2. Congure the elds and click .The password is enabled and the device is updated.
5.2 Conguring Network Security
Network security manages both access control lists and locked ports. This section contains the following topics: