User Accounts

The User Accounts page enables entering additional users that are permitted to access to the device (read-only or read-write) or changing the passwords of existing users. A user accessing the device for the first time uses the cisco/cisco username and password. After providing the default credentials, you’re prompted to replace the default level 15 username and password, and you must provide a new username and password. The new password must comply with the password complexity rules.

To add a new user, follow these steps:

Procedure


Step 1

Click Administration > User Accounts.

Step 2

In the Password Recovery Service, check Enable to enable password recovery.

Step 3

Click Add to add a new user or click Edit to modify a user and/or the password.

Step 4

Enter the parameters.

  • User Name—Enter a new username from 0 through 20 characters. UTF-8 characters aren’t permitted.

  • Current Password — Enter the current password.
  • Suggest Password— Click to auto generate a password. Next, click Copy to Clipboard to copy the password and click Yes if you would like to use the password for this account.
  • Password—Enter a password (UTF-8 characters aren’t permitted).

    Note
    Please refer to the password complexity rule section in Login Settings before creating a password.
    Note

    The password entered by the user is compared to a list of well known common passwords. If the password contains words from this list, the password will be rejected and a new one will need to be entered.

  • Confirm Password—Enter the password again.

  • Password Strength Meter—Displays the strength of password.

  • User Level—Select the privilege level of the user.

    • Read-Only CLI Access (1)—User can’t access the GUI and can only access CLI commands that don’t change the device configuration.

    • Read/Limited Write CLI Access (7)—User can’t access the GUI and can only access some CLI commands that change the device configuration. See the CLI Reference Guide for more information.

    • Read/Write Management Access (15)—User can access the GUI and can configure the device.

Step 5

Click Apply. The user is added to the Running Configuration file of the device.

Note

The password is stored in the configuration files as a non-recoverable hash using Password Based Key Derivation Function 2 (PBKDF2) with Secure Hash Algorithm, and SHA-512 as the hashing algorithm.