
47
Configuring CLI login
By default, you can log in to the CLI through the console port. After you log in, you can configure
other CLI login methods, including Telnet and SSH.
To prevent illegal access to the CLI and control user behavior, perform the following tasks as
required:
•
Configure login authentication.
•
Assign user roles.
•
Configure command authorization and command accounting.
•
Use ACLs to filter unauthorized logins.
This chapter describes how to configure and use CLI login methods, including login authentication,
user roles, and common user line settings. For more information about command authorization,
command accounting, and unauthorized access filtering, see "
Controlling user access to the device
CLI overview
User lines
The device uses user lines (also called user interfaces) to manage CLI sessions and monitor user
behavior. For a user line, you can configure access control settings, including the login
authentication method and user roles.
The device supports the user lines listed in
. Different user lines require different login
methods.
Table 11 CLI login method and user line matrix
User line
Login method
Console line
Console port on the LSUM1SUPD0 (JH198A, JH206) MPU.
AUX line
USB console port on the LSUM1SUPD0 (JH198A, JH206) MPU.
Console port on other MPUs.
Virtual type terminal (VTY) line
Telnet or SSH.
User line numbering
Every user line has an absolute number and a relative number.
An absolute number uniquely identifies a user line among all user lines. The user lines are numbered
starting from 0 and incrementing by 1, in the sequence of console, AUX, and VTY lines. You can use
the
display line
command without any parameters to view supported user lines and their absolute
numbers.
A relative number uniquely identifies a user line among all user lines of the same type. The number
format is
user line type
+
number
. User lines are numbered starting from 0 and incrementing by 1.
For example, the first VTY line is VTY 0.
User line assignment
The device assigns user lines to CLI login users depending on their login methods, as shown in
. When a user logs in, the device checks the idle user lines for the login method, and assigns the
lowest numbered user line to the user. For example, four VTY lines (0 to 3) are configured, of which
VTY 0 and VTY 3 are idle. When a user Telnets to the device, the device assigns VTY 0 to the user.
Summary of Contents for FlexNetwork 10500 Series
Page 139: ...130 Sysname display version ...