Technical data
BLADE OS Command Reference
16
The Command Line Interface BMD00127, September 2009
Accessing the Switch
To enable better switch management and user accountability, three levels or classes of user
access have been implemented on the
G8000. Levels of access to CLI, Web management func-
tions, and screens increase as needed to perform various switch management tasks. Conceptu-
ally, access classes are defined as follows:
User interaction with the switch is completely passive—nothing can be changed on the
G8000. Users may display information that has no security or privacy implications, such as
switch statistics and current operational state information.
Operators can make temporary changes on the
G8000. These changes are lost when the
switch is rebooted/reset. Operators have access to the switch management features used
for daily switch operations. Because any changes an operator makes are undone by a reset
of the switch, operators cannot severely impact switch operation.
Administrators are the only ones that may make permanent changes to the switch configu-
ration—changes that are persistent across a reboot/reset of the switch. Administrators can
access switch functions to configure and troubleshoot problems on the
G8000. Because
administrators can also make temporary (operator-level) changes as well, they must be
aware of the interactions between temporary and permanent changes.
Access to switch functions is controlled through the use of unique surnames and passwords.
Once you are connected to the switch via local Telnet, remote Telnet, or SSH, you are
prompted to enter a password. The default user names/password for each access level are listed
in the following table.
NOTE – It is recommended that you change default switch passwords after initial configuration
and as regularly as required under your network security policies. For more information, see
“Setting Passwords” on page 20.