From 269023845a5dcd936d406fbe1edc2edd45262a24 Mon Sep 17 00:00:00 2001 From: Christian Poessinger Date: Thu, 28 Nov 2019 21:41:32 +0100 Subject: Refactor "code-block:: console" to "code-block:: none" --- docs/system/login-users.rst | 20 ++++++++++---------- 1 file changed, 10 insertions(+), 10 deletions(-) (limited to 'docs/system/login-users.rst') diff --git a/docs/system/login-users.rst b/docs/system/login-users.rst index 9b7668da..424d1978 100644 --- a/docs/system/login-users.rst +++ b/docs/system/login-users.rst @@ -16,20 +16,20 @@ Local Create user account `jsmith` and the password `mypassword`. -.. code-block:: console +.. code-block:: none set system login user jsmith full-name "Johan Smith" set system login user jsmith authentication plaintext-password mypassword The command: -.. code-block:: console +.. code-block:: none show system login will show the contents of :code:`system login` configuration node: -.. code-block:: console +.. code-block:: none user jsmith { authentication { @@ -45,7 +45,7 @@ SSH with Public Keys The following command will load the public key `dev.pub` for user `jsmith` -.. code-block:: console +.. code-block:: none loadkey jsmith dev.pub @@ -53,7 +53,7 @@ The following command will load the public key `dev.pub` for user `jsmith` first. As an alternative you can also load the SSH public key directly from a remote system: -.. code-block:: console +.. code-block:: none loadkey jsmith scp://devuser@dev001.vyos.net/home/devuser/.ssh/dev.pub @@ -61,7 +61,7 @@ In addition SSH public keys can be fully added using the CLI. Each key can be given a unique identifier, `calypso` is used oin the example below to id an SSH key. -.. code-block:: console +.. code-block:: none set system login user jsmith authentication public-keys callisto key 'AAAABo..Q==' set system login user jsmith authentication public-keys callisto type 'ssh-rsa' @@ -75,7 +75,7 @@ The following command sets up two servers for RADIUS authentication, one with a discrete timeout of `5` seconds and a discrete port of `1812` and the other using a default timeout and port. -.. code-block:: console +.. code-block:: none set system login radius server 192.168.1.2 secret 's3cr3t0815' set system login radius server 192.168.1.2 timeout '5' @@ -84,7 +84,7 @@ a default timeout and port. This configuration results in: -.. code-block:: console +.. code-block:: none show system login radius { @@ -111,7 +111,7 @@ not set incoming connections to the RADIUS server will use the nearest interface address pointing towards the RADIUS server - making it error prone on e.g. OSPF networks when a link fails. -.. code-block:: console +.. code-block:: none set system login radius source-address 192.168.1.254 @@ -120,7 +120,7 @@ Login Banner You are able to set post-login or pre-login messages with the following lines: -.. code-block:: console +.. code-block:: none set system login banner pre-login "UNAUTHORIZED USE OF THIS SYSTEM IS PROHIBITED\n" set system login banner post-login "Welcome to VyOS" -- cgit v1.2.3