i
Table of Contents
1 Logging In to an Ethernet Switch ············································································································1-1
Logging In to an Ethernet Switch············································································································1-1
Introduction to the User Interface············································································································1-1
Supported User Interfaces ··············································································································1-1
Relationship Between a User and a User Interface ········································································1-2
User Interface Index ························································································································1-2
Common User Interface Configuration····························································································1-3
2 Logging In Through the Console Port·····································································································2-1
Introduction ·············································································································································2-1
Setting Up a Login Environment for Login Through the Console Port····················································2-1
Console Port Login Configuration···········································································································2-3
Common Configuration····················································································································2-3
Console Port Login Configurations for Different Authentication Modes ·················································2-5
Console Port Login Configuration with Authentication Mode Being None··············································2-6
Configuration Procedure··················································································································2-6
Configuration Example ····················································································································2-6
Console Port Login Configuration with Authentication Mode Being Password ······································2-7
Configuration Procedure··················································································································2-7
Configuration Example ····················································································································2-8
Console Port Login Configuration with Authentication Mode Being Scheme·········································2-9
Configuration Procedure··················································································································2-9
Configuration Example ··················································································································2-10
3 Logging In Through Telnet ·······················································································································3-1
Introduction ·············································································································································3-1
Common Configuration to Control Telnet Access···················································································3-1
Telnet Configurations for Different Authentication Modes·······························································3-3
Telnet Configuration with Authentication Mode Being None ··································································3-4
Configuration Procedure··················································································································3-4
Configuration Example ····················································································································3-4
Telnet Configuration with Authentication Mode Being Password ···························································3-5
Configuration Procedure··················································································································3-5
Configuration Example ····················································································································3-6
Telnet Configuration with Authentication Mode Being Scheme······························································3-7
Configuration Procedure··················································································································3-7
Configuration Example ····················································································································3-8
Telnetting to a Switch······························································································································3-9
Telnetting to a Switch from a Terminal····························································································3-9
Telnetting to another Switch from the Current Switch···································································3-11
4 Logging In Using a Modem·······················································································································4-1
Introduction ·············································································································································4-1
Configuration on the Switch Side············································································································4-1
Modem Configuration ······················································································································4-1