Setting passwords (Menu) Show
After you configure a password, if you subsequently start a new console session, you will be prompted to enter the password. Remember that usernames are optional. If you use the CLI or WebAgent to configure an optional username, the switch will prompt you for the username, and then the password. Deleting password protectionThis procedure deletes all usernames (if configured) and passwords (manager and operator). Option one
Option twoIf you do not have physical access to the switch, you will need manager-level access:
Recovering from a lost manager passwordIf you cannot start a console session at the manager level because of a lost manager password, clear the password by following these steps:
This deletes all passwords and usernames (manager and operator) used by the console and the WebAgent. Setting passwords and usernames (CLI)
Syntax:
Configuring manager and operator passwords HP Switch(config)# password manager New password: *******
Removing password protectionRemoving password protection means to eliminate password security. This command prompts you to verify that you want to remove one or both passwords, then clears the indicated password(s). (This command also clears the username associated with a password you are removing.) For example, to remove the operator password (and username, if assigned) from the switch, you would do the following: Syntax:
Syntax:
Removing a password and associated username from a switch HP Switch(config)# no password Password protection will be deleted, do you want to continue [y/n]? y HP Switch(config)# Username and password lengthThe limit on username and password length is 64 characters for the following authentication methods:
General rules for usernames and passwordsUsernames and passwords are case-sensitive. ASCII characters in the range of 33-126 are valid, including:
Restrictions for the setmib commandUsernames and passwords can be set using the CLI command
Additional restrictionsSome authentication servers prevent the usage of special symbols such as the backslash (\) and quotes (“ ”). The switch allows the use of these symbols in configurable credentials, but using them can limit access for some users who can use different client software. See the vendor’s documentation for specific information about these restrictions. Passwords implications when upgrading or downgrading software versions
When you update software from a version that does not support long passwords to a version that does support long passwords, the existing usernames and passwords continue to be there and no further action is required. Before downgrading to a software version that does not include this feature, use one of the following procedures:
Unable to use previous password
If you cannot access the switch after a software version downgrade, clear the password by using the Clear button on the switch to regain access. Then boot into a software version that supports long passwords, and perform steps 1, 2, or 3 in the preceding section. Setting passwords and usernames (WebAgent)In the WebAgent you can enter passwords and (optional) usernames. See the WebAgent Online Help for detailed information. Which of the following is a protocol that allows authentication over a non secure network by using tickets or service principal names Spns?Kerberos (/ˈkɜːrbərɒs/) is a computer-network authentication protocol that works on the basis of tickets to allow nodes communicating over a non-secure network to prove their identity to one another in a secure manner.
What term describes random bits that are added to a password before it is hashed and stored in a database?A cryptographic salt is made up of random bits added to each password instance before its hashing. Salts create unique passwords even in the instance of two users choosing the same passwords. Salts help us mitigate hash table attacks by forcing attackers to re-compute them using the salts for each user.
Which of the following is a way of hiding data in plain view in pictures graphics or text?If one needs to define steganography, it can be simply said as a practice of hiding secret messages within or over something that is no secret. It is just a process of embedding a secret piece of text within a text, picture, or audio. The message could be a message or script within a document file or a picture file.
Which of the following best describes the security account manager Sam?Which of the following best describes the Security Account Manager (SAM)? A database that stores user passwords in Windows as an LM hash or a NTLM hash.
|