Configuring Security using Device Manager 151Figure 41USM, Insert USM Table dialog box3 Enter a name.4 In the Clone From User list, select a security name from which thenew entry copies authentication data and privacy data. For example,Authentication Protocol, Authentication password, Privacy Protocol,and Privacy password.ATTENTIONThe Clone From User you select defines the maximum authentication andprivacy settings for a new user. For example, if the Clone From User doesnot use an authentication or encryption protocol, users created from thisclone cannot use the authentication or the encryption protocol. For thisreason, it is recommended that you assign both an authentication andencryption protocol to the first user you create through the CLI or Webinterface.5 From the Auth Protocol pull-down list, select an authenticationprotocol for this user. If you select an authentication protocol, enteran old and new authentication password in the next two fields.6 In the Cloned User’s Auth Password field, enter the authenticationpassword of the Cloned From User.7 In the New User’s Auth Password field, enter a new authenticationpassword for this user.8 Select a privacy protocol. If you choose to specify a privacy protocol,enter an old and new privacy password in the next two fields. This isoptional but recommended.Nortel Ethernet Routing Switch 2500 SeriesSecurity — Configuration and ManagementNN47215-505 (323165-B) 02.01 Standard4.1 19 November 2007Copyright © 2007, Nortel Networks.