{"id":10429,"date":"2026-04-08T17:21:32","date_gmt":"2026-04-08T17:21:32","guid":{"rendered":"https:\/\/resizemyimg.com\/blog\/?p=10429"},"modified":"2026-04-08T17:35:45","modified_gmt":"2026-04-08T17:35:45","slug":"how-to-set-up-a-user-on-cisco-9200l-step-by-step-guide","status":"publish","type":"post","link":"https:\/\/resizemyimg.com\/blog\/how-to-set-up-a-user-on-cisco-9200l-step-by-step-guide\/","title":{"rendered":"How to Set Up a User on Cisco 9200L (Step-by-Step Guide)"},"content":{"rendered":"<p>Setting up a user on a Cisco 9200L switch is a foundational task for network administrators who want to secure device access and delegate management responsibilities properly. The Cisco Catalyst 9200L series runs on Cisco IOS XE, offering flexible authentication options and role-based access control. Whether it is for a small office network or an enterprise deployment, configuring users correctly ensures both security and operational efficiency.<\/p>\n<p><strong><em>TLDR:<\/em><\/strong> Creating a user on a Cisco 9200L involves entering global configuration mode, defining a username and secret password, and assigning appropriate privilege levels. Administrators can store credentials locally or integrate with external authentication servers like RADIUS or TACACS+. After configuration, it is essential to save changes and verify access. Proper user setup enhances security, accountability, and operational control.<\/p>\n<h2><strong>Why User Accounts Matter on Cisco 9200L<\/strong><\/h2>\n<p>Cisco 9200L switches often operate as access-layer devices, connecting endpoints such as computers, phones, and access points. Because these switches play a critical role in enterprise networks, administrators must prevent unauthorized access to the command-line interface (CLI) and management features.<\/p>\n<p>Creating individual user accounts instead of relying solely on a shared password provides:<\/p>\n<ul>\n<li><strong>Accountability<\/strong> \u2013 Each administrator has unique credentials.<\/li>\n<li><strong>Granular privilege control<\/strong> \u2013 Different access levels can be assigned.<\/li>\n<li><strong>Improved auditability<\/strong> \u2013 Logs can associate actions with specific users.<\/li>\n<li><strong>Enhanced security<\/strong> \u2013 Strong password encryption protects credentials.<\/li>\n<\/ul>\n<h2><strong>Prerequisites Before Configuration<\/strong><\/h2>\n<p>Before beginning the configuration process, ensure the following requirements are met:<\/p>\n<ul>\n<li>Physical or remote console access to the Cisco 9200L switch<\/li>\n<li>Administrative access to enter privileged EXEC mode<\/li>\n<li>Basic familiarity with Cisco IOS CLI commands<\/li>\n<li>Terminal software such as PuTTY, Tera Term, or SecureCRT<\/li>\n<\/ul>\n<div><img loading=\"lazy\" decoding=\"async\" width=\"1080\" height=\"1440\" src=\"https:\/\/resizemyimg.com\/blog\/wp-content\/uploads\/2026\/02\/a-circuit-board-with-wires-server-rack-lights-encrypted-connection-graphic-laptop-secure-network.jpg\" class=\"attachment-full size-full\" alt=\"\" srcset=\"https:\/\/resizemyimg.com\/blog\/wp-content\/uploads\/2026\/02\/a-circuit-board-with-wires-server-rack-lights-encrypted-connection-graphic-laptop-secure-network.jpg 1080w, https:\/\/resizemyimg.com\/blog\/wp-content\/uploads\/2026\/02\/a-circuit-board-with-wires-server-rack-lights-encrypted-connection-graphic-laptop-secure-network-225x300.jpg 225w, https:\/\/resizemyimg.com\/blog\/wp-content\/uploads\/2026\/02\/a-circuit-board-with-wires-server-rack-lights-encrypted-connection-graphic-laptop-secure-network-768x1024.jpg 768w, https:\/\/resizemyimg.com\/blog\/wp-content\/uploads\/2026\/02\/a-circuit-board-with-wires-server-rack-lights-encrypted-connection-graphic-laptop-secure-network-575x767.jpg 575w\" sizes=\"(max-width: 1080px) 100vw, 1080px\" \/><\/div>\n<p>It is also recommended to confirm that the switch firmware is updated to a stable Cisco IOS XE release to avoid compatibility or security issues.<\/p>\n<h2><strong>Step 1: Access the Switch CLI<\/strong><\/h2>\n<p>Connect to the switch using a console cable or via SSH if remote access is already configured. Once connected, enter privileged EXEC mode:<\/p>\n<pre>\nSwitch&gt; enable\nSwitch#\n<\/pre>\n<p>The <em>enable<\/em> command elevates the user to privileged mode, allowing configuration changes.<\/p>\n<h2><strong>Step 2: Enter Global Configuration Mode<\/strong><\/h2>\n<p>To make configuration changes, enter global configuration mode:<\/p>\n<pre>\nSwitch# configure terminal\nSwitch(config)#\n<\/pre>\n<p>This mode allows modification of system-wide settings, including user accounts.<\/p>\n<h2><strong>Step 3: Create a Local Username and Password<\/strong><\/h2>\n<p>To create a new local user, use the following syntax:<\/p>\n<pre>\nSwitch(config)# username admin privilege 15 secret StrongPassword123\n<\/pre>\n<p>Breaking this command down:<\/p>\n<ul>\n<li><strong>username admin<\/strong> \u2013 Defines the account name.<\/li>\n<li><strong>privilege 15<\/strong> \u2013 Grants full administrative privileges (0\u201315 scale).<\/li>\n<li><strong>secret StrongPassword123<\/strong> \u2013 Sets an encrypted password.<\/li>\n<\/ul>\n<p>Using the <strong>secret<\/strong> keyword ensures the password is encrypted in the running configuration.<\/p>\n<h3><strong>Understanding Privilege Levels<\/strong><\/h3>\n<p>Cisco devices support privilege levels ranging from 0 to 15:<\/p>\n<ul>\n<li><strong>0\u20131<\/strong>: Limited or user-level access<\/li>\n<li><strong>2\u201314<\/strong>: Customizable intermediate levels<\/li>\n<li><strong>15<\/strong>: Full administrative access<\/li>\n<\/ul>\n<p>If an organization wants limited access for helpdesk personnel, the command may look like:<\/p>\n<pre>\nSwitch(config)# username helpdesk privilege 5 secret HelpdeskPass456\n<\/pre>\n<h2><strong>Step 4: Configure Line Access for Local Login<\/strong><\/h2>\n<p>Creating a username alone is not enough. The switch must be instructed to use local authentication for console and VTY (SSH\/Telnet) lines.<\/p>\n<h3><strong>Configure Console Login<\/strong><\/h3>\n<pre>\nSwitch(config)# line console 0\nSwitch(config-line)# login local\nSwitch(config-line)# exit\n<\/pre>\n<h3><strong>Configure VTY (Remote) Login<\/strong><\/h3>\n<pre>\nSwitch(config)# line vty 0 4\nSwitch(config-line)# login local\nSwitch(config-line)# transport input ssh\nSwitch(config-line)# exit\n<\/pre>\n<p>Using <strong>transport input ssh<\/strong> ensures secure remote access instead of insecure Telnet.<\/p>\n<div>Image not found in postmeta<br \/><\/div>\n<h2><strong>Step 5: Enable SSH (If Not Already Enabled)<\/strong><\/h2>\n<p>If SSH has not been configured, it must be enabled to allow secure remote login.<\/p>\n<pre>\nSwitch(config)# ip domain-name example.com\nSwitch(config)# crypto key generate rsa\nSwitch(config)# ip ssh version 2\n<\/pre>\n<p>This sequence generates RSA keys and enforces SSH version 2 for improved security.<\/p>\n<h2><strong>Step 6: Save the Configuration<\/strong><\/h2>\n<p>After creating the user and configuring login settings, save the configuration to prevent loss during reboot:<\/p>\n<pre>\nSwitch# write memory\n<\/pre>\n<p>Alternatively:<\/p>\n<pre>\nSwitch# copy running-config startup-config\n<\/pre>\n<p>Failure to save changes will result in the user account being removed after a restart.<\/p>\n<h2><strong>Step 7: Verify the Configuration<\/strong><\/h2>\n<p>To verify that the user has been created successfully:<\/p>\n<pre>\nSwitch# show running-config | include username\n<\/pre>\n<p>To test access, log out and reconnect via console or SSH using the newly created credentials.<\/p>\n<h2><strong>Optional: Integrating External Authentication<\/strong><\/h2>\n<p>In enterprise environments, local user accounts may not scale efficiently. Cisco 9200L supports external authentication methods such as RADIUS and TACACS+.<\/p>\n<div><img loading=\"lazy\" decoding=\"async\" width=\"1080\" height=\"608\" src=\"https:\/\/resizemyimg.com\/blog\/wp-content\/uploads\/2026\/03\/a-robot-with-a-light-saber-network-authentication-diagram-radius-server-switch-and-server-connection.jpg\" class=\"attachment-full size-full\" alt=\"\" srcset=\"https:\/\/resizemyimg.com\/blog\/wp-content\/uploads\/2026\/03\/a-robot-with-a-light-saber-network-authentication-diagram-radius-server-switch-and-server-connection.jpg 1080w, https:\/\/resizemyimg.com\/blog\/wp-content\/uploads\/2026\/03\/a-robot-with-a-light-saber-network-authentication-diagram-radius-server-switch-and-server-connection-300x169.jpg 300w, https:\/\/resizemyimg.com\/blog\/wp-content\/uploads\/2026\/03\/a-robot-with-a-light-saber-network-authentication-diagram-radius-server-switch-and-server-connection-1024x576.jpg 1024w, https:\/\/resizemyimg.com\/blog\/wp-content\/uploads\/2026\/03\/a-robot-with-a-light-saber-network-authentication-diagram-radius-server-switch-and-server-connection-575x324.jpg 575w, https:\/\/resizemyimg.com\/blog\/wp-content\/uploads\/2026\/03\/a-robot-with-a-light-saber-network-authentication-diagram-radius-server-switch-and-server-connection-768x432.jpg 768w\" sizes=\"(max-width: 1080px) 100vw, 1080px\" \/><\/div>\n<p>Below is a comparison chart of common authentication methods:<\/p>\n<table border=\"1\" cellpadding=\"8\" cellspacing=\"0\">\n<tr>\n<th>Feature<\/th>\n<th>Local Authentication<\/th>\n<th>RADIUS<\/th>\n<th>TACACS+<\/th>\n<\/tr>\n<tr>\n<td><strong>Centralized Management<\/strong><\/td>\n<td>No<\/td>\n<td>Yes<\/td>\n<td>Yes<\/td>\n<\/tr>\n<tr>\n<td><strong>Encryption<\/strong><\/td>\n<td>Local only<\/td>\n<td>Encrypts password only<\/td>\n<td>Encrypts entire packet<\/td>\n<\/tr>\n<tr>\n<td><strong>Command Authorization<\/strong><\/td>\n<td>Limited<\/td>\n<td>Limited<\/td>\n<td>Granular control<\/td>\n<\/tr>\n<tr>\n<td><strong>Best For<\/strong><\/td>\n<td>Small networks<\/td>\n<td>User access control<\/td>\n<td>Admin device control<\/td>\n<\/tr>\n<\/table>\n<p>Organizations that require detailed command-level auditing typically prefer TACACS+, while smaller deployments may rely solely on local authentication.<\/p>\n<h2><strong>Best Practices for User Configuration<\/strong><\/h2>\n<ul>\n<li>Always use <strong>secret<\/strong> instead of <strong>password<\/strong>.<\/li>\n<li>Enforce strong password policies.<\/li>\n<li>Disable unused accounts promptly.<\/li>\n<li>Use SSH over Telnet.<\/li>\n<li>Consider role-based access control (RBAC).<\/li>\n<li>Regularly review the running configuration.<\/li>\n<\/ul>\n<p>Additionally, administrators should implement AAA (Authentication, Authorization, and Accounting) for more advanced security policies.<\/p>\n<h2><strong>Troubleshooting Common Issues<\/strong><\/h2>\n<p><strong>Issue: Login rejected via SSH<\/strong><br \/>\nEnsure that <em>login local<\/em> is configured under VTY lines and SSH keys are properly generated.<\/p>\n<p><strong>Issue: Privilege level not applied<\/strong><br \/>\nConfirm that the user was created with the intended privilege level and that AAA configurations are not overriding local settings.<\/p>\n<p><strong>Issue: Configuration lost after reboot<\/strong><br \/>\nVerify that the configuration was saved using <em>write memory<\/em>.<\/p>\n<h2><strong>Conclusion<\/strong><\/h2>\n<p>Setting up a user on a Cisco 9200L switch is a straightforward but critical task for maintaining a secure and manageable network environment. By creating properly encrypted user accounts, assigning correct privilege levels, and enforcing secure access methods like SSH, administrators can significantly strengthen device security. Whether using local authentication for small deployments or integrating centralized AAA servers in enterprise networks, the Cisco 9200L offers flexible and powerful user management capabilities.<\/p>\n<h2><strong>Frequently Asked Questions (FAQ)<\/strong><\/h2>\n<h3><strong>1. What is the difference between \u201cpassword\u201d and \u201csecret\u201d in Cisco IOS?<\/strong><\/h3>\n<p>The <em>secret<\/em> command encrypts the password using a stronger hashing algorithm, while <em>password<\/em> may store credentials in weaker or plain text formats. The secret option is strongly recommended.<\/p>\n<h3><strong>2. How many users can be created locally on a Cisco 9200L?<\/strong><\/h3>\n<p>The switch supports multiple local users, limited primarily by system resources. For large environments, centralized authentication is recommended.<\/p>\n<h3><strong>3. Can privilege levels be customized?<\/strong><\/h3>\n<p>Yes. Privilege levels 2\u201314 can be customized to allow access to specific commands, though this requires additional configuration.<\/p>\n<h3><strong>4. Is Telnet recommended for remote access?<\/strong><\/h3>\n<p>No. Telnet transmits data in plain text. SSH should always be used for encrypted and secure communication.<\/p>\n<h3><strong>5. What happens if AAA is enabled?<\/strong><\/h3>\n<p>If AAA is configured, authentication methods defined under AAA policies may override local login settings. Proper configuration order is essential.<\/p>\n<h3><strong>6. How can a user be removed?<\/strong><\/h3>\n<p>Use the following command in global configuration mode:<\/p>\n<pre>\nSwitch(config)# no username admin\n<\/pre>\n<p>This deletes the specified user from the configuration.<\/p>\n<h3><strong>7. How can the current privilege level be checked?<\/strong><\/h3>\n<p>After logging in, use:<\/p>\n<pre>\nSwitch# show privilege\n<\/pre>\n<p>This command displays the current session\u2019s privilege level.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Setting up a user on a Cisco 9200L switch is a foundational task for network administrators who want to secure device access and delegate management responsibilities properly. The Cisco Catalyst 9200L series runs on Cisco IOS XE, offering flexible authentication options and role-based access control. Whether it is for a small office network or an enterprise deployment, configuring users correctly ensures both security and operational efficiency. <\/p>\n<p class=\"read-more-container\"><a href=\"https:\/\/resizemyimg.com\/blog\/how-to-set-up-a-user-on-cisco-9200l-step-by-step-guide\/\" class=\"read-more button\">Read more<\/a><\/p>\n","protected":false},"author":91,"featured_media":10042,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-10429","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","generate-columns","tablet-grid-50","mobile-grid-100","grid-parent","grid-50","no-featured-image-padding"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How to Set Up a User on Cisco 9200L (Step-by-Step Guide)<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/resizemyimg.com\/blog\/how-to-set-up-a-user-on-cisco-9200l-step-by-step-guide\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Set Up a User on Cisco 9200L (Step-by-Step Guide)\" \/>\n<meta property=\"og:description\" content=\"Setting up a user on a Cisco 9200L switch is a foundational task for network administrators who want to secure device access and delegate management responsibilities properly. The Cisco Catalyst 9200L series runs on Cisco IOS XE, offering flexible authentication options and role-based access control. Whether it is for a small office network or an enterprise deployment, configuring users correctly ensures both security and operational efficiency. Read more\" \/>\n<meta property=\"og:url\" content=\"https:\/\/resizemyimg.com\/blog\/how-to-set-up-a-user-on-cisco-9200l-step-by-step-guide\/\" \/>\n<meta property=\"og:site_name\" content=\"Resize my Image Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/webfactoryltd\/\" \/>\n<meta property=\"article:published_time\" content=\"2026-04-08T17:21:32+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-08T17:35:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/resizemyimg.com\/blog\/wp-content\/uploads\/2026\/02\/green-and-white-electric-device-server-rack-lights-encrypted-connection-graphic-laptop-secure-network-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1080\" \/>\n\t<meta property=\"og:image:height\" content=\"723\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jame Miller\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@webfactoryltd\" \/>\n<meta name=\"twitter:site\" content=\"@webfactoryltd\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jame Miller\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/resizemyimg.com\/blog\/how-to-set-up-a-user-on-cisco-9200l-step-by-step-guide\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/resizemyimg.com\/blog\/how-to-set-up-a-user-on-cisco-9200l-step-by-step-guide\/\"},\"author\":{\"name\":\"Jame Miller\",\"@id\":\"https:\/\/resizemyimg.com\/blog\/#\/schema\/person\/4bece8cd1b5bcd61a4e5dab002eb7dca\"},\"headline\":\"How to Set Up a User on Cisco 9200L (Step-by-Step Guide)\",\"datePublished\":\"2026-04-08T17:21:32+00:00\",\"dateModified\":\"2026-04-08T17:35:45+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/resizemyimg.com\/blog\/how-to-set-up-a-user-on-cisco-9200l-step-by-step-guide\/\"},\"wordCount\":1082,\"publisher\":{\"@id\":\"https:\/\/resizemyimg.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/resizemyimg.com\/blog\/how-to-set-up-a-user-on-cisco-9200l-step-by-step-guide\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/resizemyimg.com\/blog\/wp-content\/uploads\/2026\/02\/green-and-white-electric-device-server-rack-lights-encrypted-connection-graphic-laptop-secure-network-1.jpg\",\"articleSection\":[\"Blog\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/resizemyimg.com\/blog\/how-to-set-up-a-user-on-cisco-9200l-step-by-step-guide\/\",\"url\":\"https:\/\/resizemyimg.com\/blog\/how-to-set-up-a-user-on-cisco-9200l-step-by-step-guide\/\",\"name\":\"How to Set Up a User on Cisco 9200L (Step-by-Step Guide)\",\"isPartOf\":{\"@id\":\"https:\/\/resizemyimg.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/resizemyimg.com\/blog\/how-to-set-up-a-user-on-cisco-9200l-step-by-step-guide\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/resizemyimg.com\/blog\/how-to-set-up-a-user-on-cisco-9200l-step-by-step-guide\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/resizemyimg.com\/blog\/wp-content\/uploads\/2026\/02\/green-and-white-electric-device-server-rack-lights-encrypted-connection-graphic-laptop-secure-network-1.jpg\",\"datePublished\":\"2026-04-08T17:21:32+00:00\",\"dateModified\":\"2026-04-08T17:35:45+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/resizemyimg.com\/blog\/how-to-set-up-a-user-on-cisco-9200l-step-by-step-guide\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/resizemyimg.com\/blog\/how-to-set-up-a-user-on-cisco-9200l-step-by-step-guide\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/resizemyimg.com\/blog\/how-to-set-up-a-user-on-cisco-9200l-step-by-step-guide\/#primaryimage\",\"url\":\"https:\/\/resizemyimg.com\/blog\/wp-content\/uploads\/2026\/02\/green-and-white-electric-device-server-rack-lights-encrypted-connection-graphic-laptop-secure-network-1.jpg\",\"contentUrl\":\"https:\/\/resizemyimg.com\/blog\/wp-content\/uploads\/2026\/02\/green-and-white-electric-device-server-rack-lights-encrypted-connection-graphic-laptop-secure-network-1.jpg\",\"width\":1080,\"height\":723},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/resizemyimg.com\/blog\/how-to-set-up-a-user-on-cisco-9200l-step-by-step-guide\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/resizemyimg.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to Set Up a User on Cisco 9200L (Step-by-Step Guide)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/resizemyimg.com\/blog\/#website\",\"url\":\"https:\/\/resizemyimg.com\/blog\/\",\"name\":\"Resize my Image Blog\",\"description\":\"News, insights, tips&amp;tricks on image related business &amp; SaaS\",\"publisher\":{\"@id\":\"https:\/\/resizemyimg.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/resizemyimg.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/resizemyimg.com\/blog\/#organization\",\"name\":\"WebFactory Ltd\",\"url\":\"https:\/\/resizemyimg.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/resizemyimg.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/resizemyimg.com\/blog\/wp-content\/uploads\/2019\/12\/webfactory_icon.png\",\"contentUrl\":\"https:\/\/resizemyimg.com\/blog\/wp-content\/uploads\/2019\/12\/webfactory_icon.png\",\"width\":300,\"height\":300,\"caption\":\"WebFactory Ltd\"},\"image\":{\"@id\":\"https:\/\/resizemyimg.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/webfactoryltd\/\",\"https:\/\/x.com\/webfactoryltd\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/resizemyimg.com\/blog\/#\/schema\/person\/4bece8cd1b5bcd61a4e5dab002eb7dca\",\"name\":\"Jame Miller\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/resizemyimg.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f60a3114f608fcfdd6b15a13f37f24b2?s=96&d=monsterid&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f60a3114f608fcfdd6b15a13f37f24b2?s=96&d=monsterid&r=g\",\"caption\":\"Jame Miller\"},\"description\":\"I'm Jame Miller, a cybersecurity analyst and blogger. Sharing knowledge on online security, data protection, and privacy issues is what I do best.\",\"url\":\"https:\/\/resizemyimg.com\/blog\/author\/jamesm\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to Set Up a User on Cisco 9200L (Step-by-Step Guide)","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/resizemyimg.com\/blog\/how-to-set-up-a-user-on-cisco-9200l-step-by-step-guide\/","og_locale":"en_US","og_type":"article","og_title":"How to Set Up a User on Cisco 9200L (Step-by-Step Guide)","og_description":"Setting up a user on a Cisco 9200L switch is a foundational task for network administrators who want to secure device access and delegate management responsibilities properly. The Cisco Catalyst 9200L series runs on Cisco IOS XE, offering flexible authentication options and role-based access control. Whether it is for a small office network or an enterprise deployment, configuring users correctly ensures both security and operational efficiency. Read more","og_url":"https:\/\/resizemyimg.com\/blog\/how-to-set-up-a-user-on-cisco-9200l-step-by-step-guide\/","og_site_name":"Resize my Image Blog","article_publisher":"https:\/\/www.facebook.com\/webfactoryltd\/","article_published_time":"2026-04-08T17:21:32+00:00","article_modified_time":"2026-04-08T17:35:45+00:00","og_image":[{"width":1080,"height":723,"url":"https:\/\/resizemyimg.com\/blog\/wp-content\/uploads\/2026\/02\/green-and-white-electric-device-server-rack-lights-encrypted-connection-graphic-laptop-secure-network-1.jpg","type":"image\/jpeg"}],"author":"Jame Miller","twitter_card":"summary_large_image","twitter_creator":"@webfactoryltd","twitter_site":"@webfactoryltd","twitter_misc":{"Written by":"Jame Miller","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/resizemyimg.com\/blog\/how-to-set-up-a-user-on-cisco-9200l-step-by-step-guide\/#article","isPartOf":{"@id":"https:\/\/resizemyimg.com\/blog\/how-to-set-up-a-user-on-cisco-9200l-step-by-step-guide\/"},"author":{"name":"Jame Miller","@id":"https:\/\/resizemyimg.com\/blog\/#\/schema\/person\/4bece8cd1b5bcd61a4e5dab002eb7dca"},"headline":"How to Set Up a User on Cisco 9200L (Step-by-Step Guide)","datePublished":"2026-04-08T17:21:32+00:00","dateModified":"2026-04-08T17:35:45+00:00","mainEntityOfPage":{"@id":"https:\/\/resizemyimg.com\/blog\/how-to-set-up-a-user-on-cisco-9200l-step-by-step-guide\/"},"wordCount":1082,"publisher":{"@id":"https:\/\/resizemyimg.com\/blog\/#organization"},"image":{"@id":"https:\/\/resizemyimg.com\/blog\/how-to-set-up-a-user-on-cisco-9200l-step-by-step-guide\/#primaryimage"},"thumbnailUrl":"https:\/\/resizemyimg.com\/blog\/wp-content\/uploads\/2026\/02\/green-and-white-electric-device-server-rack-lights-encrypted-connection-graphic-laptop-secure-network-1.jpg","articleSection":["Blog"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/resizemyimg.com\/blog\/how-to-set-up-a-user-on-cisco-9200l-step-by-step-guide\/","url":"https:\/\/resizemyimg.com\/blog\/how-to-set-up-a-user-on-cisco-9200l-step-by-step-guide\/","name":"How to Set Up a User on Cisco 9200L (Step-by-Step Guide)","isPartOf":{"@id":"https:\/\/resizemyimg.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/resizemyimg.com\/blog\/how-to-set-up-a-user-on-cisco-9200l-step-by-step-guide\/#primaryimage"},"image":{"@id":"https:\/\/resizemyimg.com\/blog\/how-to-set-up-a-user-on-cisco-9200l-step-by-step-guide\/#primaryimage"},"thumbnailUrl":"https:\/\/resizemyimg.com\/blog\/wp-content\/uploads\/2026\/02\/green-and-white-electric-device-server-rack-lights-encrypted-connection-graphic-laptop-secure-network-1.jpg","datePublished":"2026-04-08T17:21:32+00:00","dateModified":"2026-04-08T17:35:45+00:00","breadcrumb":{"@id":"https:\/\/resizemyimg.com\/blog\/how-to-set-up-a-user-on-cisco-9200l-step-by-step-guide\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/resizemyimg.com\/blog\/how-to-set-up-a-user-on-cisco-9200l-step-by-step-guide\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/resizemyimg.com\/blog\/how-to-set-up-a-user-on-cisco-9200l-step-by-step-guide\/#primaryimage","url":"https:\/\/resizemyimg.com\/blog\/wp-content\/uploads\/2026\/02\/green-and-white-electric-device-server-rack-lights-encrypted-connection-graphic-laptop-secure-network-1.jpg","contentUrl":"https:\/\/resizemyimg.com\/blog\/wp-content\/uploads\/2026\/02\/green-and-white-electric-device-server-rack-lights-encrypted-connection-graphic-laptop-secure-network-1.jpg","width":1080,"height":723},{"@type":"BreadcrumbList","@id":"https:\/\/resizemyimg.com\/blog\/how-to-set-up-a-user-on-cisco-9200l-step-by-step-guide\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/resizemyimg.com\/blog\/"},{"@type":"ListItem","position":2,"name":"How to Set Up a User on Cisco 9200L (Step-by-Step Guide)"}]},{"@type":"WebSite","@id":"https:\/\/resizemyimg.com\/blog\/#website","url":"https:\/\/resizemyimg.com\/blog\/","name":"Resize my Image Blog","description":"News, insights, tips&amp;tricks on image related business &amp; SaaS","publisher":{"@id":"https:\/\/resizemyimg.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/resizemyimg.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/resizemyimg.com\/blog\/#organization","name":"WebFactory Ltd","url":"https:\/\/resizemyimg.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/resizemyimg.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/resizemyimg.com\/blog\/wp-content\/uploads\/2019\/12\/webfactory_icon.png","contentUrl":"https:\/\/resizemyimg.com\/blog\/wp-content\/uploads\/2019\/12\/webfactory_icon.png","width":300,"height":300,"caption":"WebFactory Ltd"},"image":{"@id":"https:\/\/resizemyimg.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/webfactoryltd\/","https:\/\/x.com\/webfactoryltd"]},{"@type":"Person","@id":"https:\/\/resizemyimg.com\/blog\/#\/schema\/person\/4bece8cd1b5bcd61a4e5dab002eb7dca","name":"Jame Miller","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/resizemyimg.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f60a3114f608fcfdd6b15a13f37f24b2?s=96&d=monsterid&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f60a3114f608fcfdd6b15a13f37f24b2?s=96&d=monsterid&r=g","caption":"Jame Miller"},"description":"I'm Jame Miller, a cybersecurity analyst and blogger. Sharing knowledge on online security, data protection, and privacy issues is what I do best.","url":"https:\/\/resizemyimg.com\/blog\/author\/jamesm\/"}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/resizemyimg.com\/blog\/wp-json\/wp\/v2\/posts\/10429"}],"collection":[{"href":"https:\/\/resizemyimg.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/resizemyimg.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/resizemyimg.com\/blog\/wp-json\/wp\/v2\/users\/91"}],"replies":[{"embeddable":true,"href":"https:\/\/resizemyimg.com\/blog\/wp-json\/wp\/v2\/comments?post=10429"}],"version-history":[{"count":1,"href":"https:\/\/resizemyimg.com\/blog\/wp-json\/wp\/v2\/posts\/10429\/revisions"}],"predecessor-version":[{"id":10439,"href":"https:\/\/resizemyimg.com\/blog\/wp-json\/wp\/v2\/posts\/10429\/revisions\/10439"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/resizemyimg.com\/blog\/wp-json\/wp\/v2\/media\/10042"}],"wp:attachment":[{"href":"https:\/\/resizemyimg.com\/blog\/wp-json\/wp\/v2\/media?parent=10429"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/resizemyimg.com\/blog\/wp-json\/wp\/v2\/categories?post=10429"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/resizemyimg.com\/blog\/wp-json\/wp\/v2\/tags?post=10429"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}