4-14 User Interface Configuration ExamplesUser Authentication Configuration ExampleNetwork diagramAs shown in Figure 4-1, command levels should be configured for different users to secure Device:z The device administrator accesses Device through the console port on Host A. When theadministrator logs in to the device, username and password are not required.z Users access Device through an Ethernet interface on Host B. When a user logs in to Device,both username and password are required. Only the authenticated users can log in and performconfigurations. RADIUS authentication is of higher priority, and local authentication is used whenthe RADIUS server or the link fails. The local username is monitor and password is 123.Figure 4-1 Network diagram for configuring user authenticationConfiguration procedure# Assign an IP address to Device to make Device be reachable from Host A, Host B, Host C, andRADIUS server. The configuration is omitted.# Enable telnet services on Device. system-view[Device] telnet server enable# Set that no authentication is needed when users use the console port to log in to Device. Set theprivilege level of the administrator logging in from the console port to 3, that is, the administrator canexecute all the device commands.[Device] user-interface aux 0[Device-ui-aux0] authentication-mode none[Device-ui-aux0] user privilege level 3[Device-ui-aux0] quit# Set to use username and password authentication when users use VTY interface to log in to Devicefrom Host B. The command level that a login user on VTY can access depends on the userconfiguration on the AAA server.[Device] user-interface vty 0 4[Device-ui-vty0-4] authentication-mode scheme