Configuring A Login Banner; Protecting Access To Privileged Exec Commands - Cisco C3201FESMIC-TP= - 3201 Fast EN Switch Mobile Interface Card Expansion Module Software Configuration Manual

Wireless mic
Table of Contents

Advertisement

Administering the WMIC

Configuring a Login Banner

You can configure a login banner to appear on all connected terminals. This banner appears after the
MOTD banner and before the login prompt.
To configure a login banner, follow these steps, beginning in privileged EXEC mode:
Command
Step 1
configure terminal
Step 2
banner login c message c
Step 3
end
Step 4
show running-config
Step 5
copy running-config startup-config
To delete the login banner, use the no banner login global configuration command.
This example shows how to configure a login banner for the WMIC using the dollar sign ($) symbol as
the beginning and ending delimiter:
bridge(config)# banner login $
Access for authorized users only. Please enter your username and password.
$
bridge(config)#

Protecting Access to Privileged EXEC Commands

A simple way of controlling terminal access in your network is to use passwords and assign privilege
levels. Password protection restricts access to a network or network device. Privilege levels define what
commands users can issue after they have logged into a network device.
For complete syntax and usage information for the commands used in this section, see the Cisco IOS
Note
Security Command Reference for Release 12.2.
Purpose
Enters global configuration mode.
Specifies the login message.
For c, enter the delimiting character of your choice, such as a pound sign
(#), and press the Return key. The delimiting character signifies the
beginning and end of the banner text. Characters after the ending delimiter
are discarded.
For message, enter a login message up to 255 characters. You cannot use the
delimiting character in the message.
Returns to privileged EXEC mode.
Verifies your entries.
(Optional) Saves your entries in the configuration file.
Cisco 3200 Series Wireless MIC Software Configuration Guide
Protecting Access to Privileged EXEC Commands
5

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents