Setting the administrator password complexity on the USG6000

10

For security, the USG6000 series does not support modifying the password complexity.

Other related questions:
Modifying the administrator password complexity on the USG2000&5000
The password complexity requirement of the USG2000&5000 cannot be modified. After the password policy is enabled, only passwords that meet the password complexity requirement can be successfully configured. Enable or disable the password policy as follows: - On the web UI, choose System > Admin > Administrators, select or deselect Password Policy, and click Apply. - An example of enabling or disabling the password policy through the CLI is as follows: # Enable the password policy. system-view [sysname]aaa [sysname-aaa]password-policy mandatory enable # Disable the password policy. system-view [sysname]aaa [sysname-aaa]undo password-policy mandatory enable By default, the password policy is enabled. After you disable the function, passwords that do not meet complexity requirements can be configured. However, these passwords bring about security risks and you are advised not to disable this function.

Method for setting a permanently available password for the administrator of the USG6000 series
For the USG6000 series, the following example is provided for you to set the validity period of the administrator login password: # Set the password validity period for the administrator test to 80 days. system-view [sysname] aaa [sysname-aaa] manager-user test [sysname--manager-user-test] password valid-days 80 For the USG2000&5000 series, the following example is provided for you to set the validity period of the administrator login password: # Set the password validity period for the administrator test to 80 days. system-view [sysname] aaa [sysname-aaa] local-user test password valid-days 80 If valid-days is set to 0, the password never expires. For more command details, see the product documentation.

BMC password complexity
Complexity check is enabled by default for iBMC password and SNMP community names. The password and SNMP community names must meet the following requirements: ? Contain 8 to 20 characters. ? Contain at least a space or one of the following special characters: `~!@#$%^&*()-_=+\|[{}];:'",<.>/? ? Contain at least two types of the following characters: ? Uppercase letters A to Z ? Lowercase letters a to z ? Digits 0 to 9 ? Cannot be the same as the user name or the user name in reverse order. Only the system administrator can enable or disable the password complexity check.

Setting the web password for the USG6000
The default user name and password (admin/Admin@123) of a web user are used for login by default. For system security purposes, change the web administrator password immediately after login. system-view [sysname] aaa [sysname-aaa] manager-user admin1 [sysname-aaa-manager-user-admin1] password Enter Password: Confirm Password: [sysname-aaa-manager-user-admin1] service-type web [sysname-aaa-manager-user-admin1] level 3

Setting the console password on the USG6000
For the login through the console port, the account and password must be set. 1. During the first log, use the default account (admin) and password (Admin@123) of the console port. 2. To prevent an unauthorized user to access the device with the default account and password, you are advised to change this password after your first login to the device. system-view [sysname] user-interface Console 0 [sysname-ui-Console0] authentication-mode local user maintain password cipher Password@123

If you have more questions, you can seek help from following ways:
To iKnow To Live Chat
Scroll to top