1-8z lock-time: In this mode, the system inhibits the user from re-logging in within a certain time period.After the period, the user is allowed to log into the switch again. By default, this time is 120minutes.z lock: In this mode, the system inhibits the user from re-logging in forever. The user is allowed tolog into the switch again only after the administrator removes the user from the user blacklist.z unlock: In this mode, the system allows the user to log in again.z Login attempt times limitation and failure processing are not supported for FTP and Superpasswords.z The number of retries allowed to enter an SSH password is determined by the configuration of theSSH server instead of that configured by using the password-control login-attempt command.You can use the password-control login-attempt command to configure the actions to be takenwhen the number of retries to enter the SSH password exceeds the configured value. Refer toSSH Terminal Services part for information about SSH server.z If a user in the blacklist changes his/her IP address, the blacklist will not affect the user anymorewhen the user logs into the switch.The system administrator can perform the following operations to manually remove one or all userentries in the blacklist.Table 1-8 Manually remove one or all user entries in the blacklistOperation Command DescriptionDelete one specific or alluser entries in the blacklistreset password-controlblacklist [ user-nameuser-name ]Executing this command without theuser-name user-name optionremoves all the user entries in theblacklist.Executing this command with theuser-name user-name optionremoves the specified user entry in theblacklist.Configuring the Password Authentication Timeout TimeWhen the local/remote server receives the user name, the authentication starts; when the userauthentication is completed, the authentication ends. Whether the user is authenticated on the localserver or on a remote server is determined by the related AAA configuration.If a password authentication is not completed before the authentication timeout expires, theauthentication fails, and the system terminates the connection and makes some logging.If a password authentication is completed within the authentication timeout time, the user will log intothe switch normally.