37
NOTE:
Telnet is not supported in FIPS mode.
The device supports telnet. You can telnet to the device to remotely manage and maintain it, as shown
.
Figure 8
Telnet login
The following table shows the configuration requirements of telnet login.
Object Requirements
Telnet server
Configure the IP address of the VLAN interface, and make sure the telnet server
and client can reach each other.
Configure the authentication mode and other settings
Telnet client
Run the telnet client program.
Obtain the IP address of the VLAN interface on the server
By default, the device is enabled with the telnet server and client functions.
•
On a device that serves as the telnet client, you can log in to a telnet server to perform operations
on the server.
•
On a device that serves as the telnet server, you can configure the authentication mode and user
privilege level for telnet users. By default, you cannot log in to the device through telnet. Before you
can telnet to the device, you need to log in to the device through the console port, enable telnet
server, and configure the authentication mode, user privilege level, and common settings.
This section includes these topics:
•
Telnet login authentication modes
•
Configuring none authentication for telnet login
•
Configuring password authentication for telnet login
•
Configuring scheme authentication for telnet login
•
Configuring common settings for VTY user interfaces (optional)
•
Configuring the device to log in to a telnet server as a telnet client
Telnet login authentication modes
Three authentication modes are available for telnet login:
none
,
password
, and
scheme
.
•
none
—requires no username and password at the next login through telnet. This mode is insecure.
•
password
—requires password authentication at the next login through telnet. Keep your password.
If you lose your password, log in to the device through the console port to view or modify the
password.
•
scheme
—requires username and password authentication at the next login through telnet.
Authentication falls into local authentication and remote authentication. To use local authentication,
configure a local user and related parameters. To use remote authentication, configure the