3com 3.01.01 User Manual

Page of 356
20
C
HAPTER
 1: S
YSTEM
 A
CCESS
Login users are also classified into four levels that correspond to the four 
command levels. After users of different levels log in, they can only use commands 
at their own, or lower, levels.
To prevent unauthorized users from illegal intrusion, users are identified when 
switching from a lower level to a higher level with the super [ level ] command. 
User ID authentication is performed when users at a lower level switch to users at 
a higher level. Only when correct password is entered three times, can the user 
switch to the higher level. Otherwise, the original user level remains unchanged.
Command views are implemented according to requirements that are related to 
one another. For example, after logging in to the Switch 8800, you enter user 
view, in which you can only use some basic functions, such as displaying the 
operating state and statistics information. In user view, key in system-view to 
enter system view, in which you can key in different configuration commands and 
enter the corresponding views.
The command line provides the following views:
User view
System view
Ethernet Port view
VLAN view
VLAN interface view
Local-user view
User interface view
FTP client view
PIM view
RIP view
OSPF view
OSPF area view
Route policy view
Basic ACL view
Advanced ACL view
Layer-2 ACL view
RADIUS server group view
ISP domain view
BGP view
ISIS view
The relation diagram of the views is shown in Figure 13.