i
Table of Contents
1 Logging into an Ethernet Switch ·············································································································1-1
Logging into an Ethernet Switch ·············································································································1-1
Introduction to the User Interface············································································································1-1
Supported User Interfaces ··············································································································1-1
User Interface Index ························································································································1-1
Common User Interface Configuration····························································································1-2
2 Logging in through the Console Port······································································································2-1
Introduction ·············································································································································2-1
Logging in through the Console Port ······································································································2-1
Console Port Login Configuration ···········································································································2-4
Common Configuration····················································································································2-4
Console Port Login Configurations for Different Authentication Modes··········································2-4
Console Port Login Configuration with Authentication Mode Being None··············································2-5
Configuration Procedure··················································································································2-5
Configuration Example ····················································································································2-7
Console Port Login Configuration with Authentication Mode Being Password ······································2-8
Configuration Procedure··················································································································2-8
Configuration Example ····················································································································2-9
Console Port Login Configuration with Authentication Mode Being Scheme ·······································2-10
Configuration Procedure················································································································2-10
Configuration Example ··················································································································2-12
3 Logging in through Telnet ························································································································3-1
Introduction ·············································································································································3-1
Common Configuration····················································································································3-1
Telnet Configurations for Different Authentication Modes·······························································3-2
Telnet Configuration with Authentication Mode Being None ··································································3-3
Configuration Procedure··················································································································3-3
Configuration Example ····················································································································3-4
Telnet Configuration with Authentication Mode Being Password ···························································3-5
Configuration Procedure··················································································································3-5
Configuration Example ····················································································································3-6
Telnet Configuration with Authentication Mode Being Scheme······························································3-7
Configuration Procedure··················································································································3-7
Configuration Example ··················································································································3-10
Telnetting to a Switch····························································································································3-11
Telnetting to a Switch from a Terminal··························································································3-11
Telnetting to another Switch from the Current Switch···································································3-13
4 Logging in Using a Modem·······················································································································4-1
Introduction ·············································································································································4-1
Summary of Contents for S3100 Series
Page 74: ...7 7 Sysname ip http acl 2030...
Page 270: ...1 51 Sysname GigabitEthernet1 0 1 port trunk permit vlan all...
Page 579: ...ii Configuration Example 2 4 QoS Profile Configuration Example 2 4...
Page 713: ...1 22 Total associations 1...
Page 823: ...1 16...
Page 1054: ...i Table of Contents Appendix A Acronyms A 1...