Deployment Guide

Table Of Contents
Version Description
7.5.1.0 Introduced on the C-Series.
6.3.1.0 Introduced on the E-Series.
Example
In the following example, after 5 un-successful login attempts, the session (SSH/TELNET) goes into a
locked state for 5 minutes. If all the 10 sessions are locked out with 5 un-successful attempts in each
session, no users can login during the lockout-period.
Dell(conf)#password-attributes max-retry 5 lockout-period 5
Related
Commands
password specifies a password for users on terminal lines.
service obscure-passwords
Enable the obscuring of passwords and keys.
C9000 Series
Syntax
service obscure-passwords
Enable the obscuring of passwords and keys, including RADIUS, TACACS+ keys, router authentication
strings, VRRP authentication, use the service obscure-passwords command.
Defaults Disabled.
Command Modes CONFIGURATION
Command
History
This guide is platform-specific. For command information about other platforms, refer to the relevant Dell
Networking OS Command Line Reference Guide.
The following is a list of the Dell Networking OS version history for this command.
Version Description
9.9(0.0) Introduced on the C9010.
9.6.0.0 Introduced on the S4810, S4820T, S5000, S6000, Z9000, Z9500, MXL
Usage
Information
By default, the service password-encryption command stores encrypted passwords. For greater
security, you can also use the service obscure-passwords command to prevent a user from
reading the passwords and keys, including RADIUS, TACACS+ keys, router authentication strings,
VRRP authentication by obscuring this information. Passwords and keys are stored encrypted in the
configuration file and by default are displayed in the encrypted form when the configuration is displayed.
Enabling the service obscure-passwords command displays asterisks instead of the encrypted
passwords and keys. This command prevents a user from reading these passwords and keys by obscuring
this information with asterisks.
Password obscuring masks the password and keys for display only but does not change the contents of
the file. The string of asterisks is the same length as the encrypted string for that line of configuration.
To verify that you have successfully obscured passwords and keys, use the show running-config
command or show startup-config command.
If you are using role-based access control (RBAC), only the system administrator and security
administrator roles can enable the service obscure-password command.
Related
Commands
show running-config Display the current configuration and display changes from the default values.
service password-encryption Encrypts all passwords configured in the system.
1518 Security