Command Line Interface 25To prevent unauthorized users from illegal intrusion, the user will be identifiedwhen switching from a lower level to a higher level with the super [ level ]command. User ID authentication is performed when users at lower level becomeusers at a higher level. In other words, the user password for the higher level isneeded. (Suppose the user has entered super password [ level level ] { simple| cipher } password..) For the sake of confidentiality, on the screen the usercannot see the password that they entered. Only when correct password is inputthree times, can the user switch to the higher level. Otherwise, the original userlevel will remain unchanged.Different command views are implemented according to different requirements.They are related to one another. For example, after logging in to the Switch, youwill enter User View, in which you can only use some basic functions such asdisplaying the running state and statistics information. In User View, entersystem-view to enter System View, in which you can key in differentconfiguration commands and enter the corresponding views.The command line provides the following views:■ User View■ System View■ Ethernet Port View■ VLAN View■ VLAN Interface View■ Local-User View■ User Interface View■ FTP Client View■ RSA Public Key View■ RSA Key Code View■ RIP View■ Route Policy View■ Basic ACL View■ Advanced ACL View■ Layer-2 ACL View■ User-Defined ACL View■ QoS Profile View■ RADIUS Server Group View■ ISP Domain ViewTable 5 describes the features of different views and the ways to enter or quit.