i
Table of Contents
1 Logging In to an Ethernet Switch ············································································································1-1
Logging In to an Ethernet Switch ············································································································1-1
Introduction to User Interface··················································································································1-1
Supported User Interfaces ··············································································································1-1
Users and User Interfaces···············································································································1-2
User Interface Number ····················································································································1-2
Common Login in to an Ethernet Switch·································································································1-2
2 Logging In Through the Console Port·····································································································2-1
Introduction ·············································································································································2-1
Setting Up the Connection to the Console Port ······················································································2-1
Console Port Login Configuration ···········································································································2-3
Common Configuration····················································································································2-3
Console Port Login Configurations for Different Authentication Modes··········································2-4
Console Port Login Configuration with Authentication Mode Being None··············································2-5
Configuration Procedure··················································································································2-5
Configuration Example ····················································································································2-6
Console Port Login Configuration with Authentication Mode Being Password ······································2-7
Configuration Procedure··················································································································2-7
Configuration Example ····················································································································2-7
Console Port Login Configuration with Authentication Mode Being Scheme ·········································2-9
Configuration Procedure··················································································································2-9
Configuration Example ··················································································································2-10
3 Logging In Through Telnet/SSH···············································································································3-1
Logging In Through Telnet ······················································································································3-1
Introduction······································································································································3-1
Telnet Connection Establishment····································································································3-2
Common Configuration····················································································································3-4
Telnet Login Configuration Task List·······························································································3-5
Telnet Configuration with Authentication Mode Being None···························································3-5
Telnet Configuration with Authentication Mode Being Password ···················································3-7
Telnet Configuration with Authentication Mode Being Scheme ······················································3-8
Logging In Through SSH ······················································································································3-10
4 Logging In Using Modem··························································································································4-1
Introduction ·············································································································································4-1
Modem Connection Establishment ·········································································································4-1
Configuration on the Administrator Side ·································································································4-3
Configuration on the Switch Side············································································································4-4
Modem Configuration ······················································································································4-4
Switch Configuration························································································································4-4
Configuration on switch when the authentication mode is none ·····················································4-4
Configuration on switch when the authentication mode is password··············································4-4
Configuration on switch when the authentication mode is scheme ················································4-5