32
User interface aux0 is available.
Press ENTER to get started.
Press
Enter
at the prompt, and you can configure the switch when the prompt <HP> appears.
For more information about initial switch configuration, see ―
Initially configuring the switch
.‖
Initially configuring the switch
By default, the administrator can only log in to the switch through the console port without any authentication.
The default login method does not facilitate remote maintenance and management of the switch, and brings
vulnerabilities to the switch. After the first login, you can perform the following configurations.
Configure the login method so that you can remotely maintain and manage the switch and control login
user privileges.
Configure the access function of the switch to satisfy the requirements of different users.
Configuring a login authentication method
By configuring the authentication mode and the corresponding username, authentication method, and user
privilege level, you can perform login user privilege control, and improve switch security.
The switch supports login through the console port, telnet, SSH, and NMS.
The following section takes login through telnet for example. Login through telnet supports three login
authentication methods.
Table 8
Telnet login authentication methods
Authentication method
Feature
Application scenarios
None
Easy to configure, allows any
user to Telnet to your switch, and
lowest in security
Lab environments and extremely secure
network environments
Password
Easy to configure, allows any
user knowing the password to
telnet to your switch, high in
security, but incapable of
assigning different privilege
levels to different users
Environments that do not need granular
privilege management
Username and password
Complex to configure, allows
users inputting the correct
username and password to
Telnet to your switch, high in
security, and capable of
assigning different privilege
levels to different users
Environments where multiple operators
cooperate to manage the switch