HP 200 Unified Threat Management (UTM) Appliance Using the device to log in to a Telnet server

Page 40

Step

Command

Remarks

 

 

Optional.

4.Enable the user interfaces to support Telnet, SSH, or both of them.

protocol inbound { all ssh telnet }

By default, both Telnet and SSH are supported.

The configuration takes effect the next time you log in.

5. Define a shortcut key for

escape-key { default

Optional.

By default, pressing Ctrl+C

terminating tasks.

character }

 

 

terminates a task.

6. Configure the type of terminal

 

Optional.

terminal type { ansi vt100 }

By default, the terminal display

display.

 

 

type is ANSI.

 

 

 

 

 

Optional.

7. Set the maximum number of lines

screen-length screen-length

By default, up to 24 lines is

to be displayed on a screen.

displayed on a screen.

 

 

 

A value of 0 disables the function.

 

 

 

8. Set the size of command history

history-command max-size

Optional.

By default, the buffer saves 10

buffer.

value

 

 

history commands.

 

 

Optional.

 

 

The default idle-timeout is 10

 

 

minutes for all user interfaces.

 

 

The system automatically

9. Set the idle-timeout timer.

idle-timeout minutes [ seconds ]

terminates the user's connection if

 

 

there is no information interaction

 

 

between the device and the user

 

 

within the timeout time.

 

 

Setting idle-timeout to 0 disables

 

 

the timer.

 

 

 

 

 

Optional.

 

 

By default, no automatically

 

 

executed command is specified.

10. Specify a command to be

 

The command auto-execute

auto-execute command

function is typically used for

automatically executed when a

command

redirecting a Telnet user to a

user logs in to the user interfaces.

 

specific host. After executing the

 

 

 

 

specified command and

 

 

performing the incurred task, the

 

 

system automatically disconnect

 

 

the Telnet session.

 

 

 

Using the device to log in to a Telnet server

You can use the device as a Telnet client to log in to a Telnet server. If the server is located in a different subnet than the device, make sure the two devices have routes to reach each other.

34

Image 40
Contents HP Firewalls and UTM Devices Page Contents Page Iii Page Overview F1000-A-EI/F1000-S-EIOverview AppearanceF1000-E Front viewF5000 Aspf Firewall modules Firewall module for 5800 switches Enhanced firewall modulesUTM products U200-A U200-A front viewApplication scenarios F1000-A-EI/F1000-S-EIU200-S Firewall applicationVirtual firewall application VPN applicationF1000-E F5000 Firewall modulesEnhanced firewall modules Clound computing data center applicationRemote access application Enterprise network applicatoinUTM Network diagram Login overview Login methods at a glanceLogin methods Login method Default setting and configuration requirementsCLI login method and user interface matrix User interface Login methodCLI user interfaces User interface assignmentPage Default console port properties Parameter DefaultLogging in to the CLI Logging in through the console port for the first timeConnection description Configuring console login control settings Setting the properties of the serial portConfiguring none authentication for console login Authentication Configuration tasks Reference ModeCommand Remarks Last-numberConfiguring password authentication for console login Configuring scheme authentication for console loginConfiguration Guide PasswordDomain domain-name Hwtacacs-scheme-nameConfiguring common console user interface settings optional Speed speed-valueTelnet login Logging in through TelnetTelnet server and Telnet client configuration requirements Device role RequirementsConfiguring none authentication for Telnet login Configuring password authentication for Telnet login Telnetting to the device without authenticationConfiguring scheme authentication for Telnet login Password authentication interface for Telnet loginUser only depend on the user Configuring common VTY user interface settings optional Step Command RemarksUsing the device to log in to a Telnet server CommandCharacter ValueLogging in through SSH To use the device to log in to a Telnet serverConfiguring the SSH server on the device SSH server and client requirementsLdap-scheme-name Local login through the AUX port Using the device to log in to an SSH serverStarted Command Reference Ssh2 serverHardware Feature compatible AUX login diagramConfiguring none authentication for AUX login Configuring password authentication for AUX login Configuring scheme authentication for AUX login Password authentication interface for AUX loginApply the specified AAA Configuring common settings for AUX login optional Ip alias ip-address port-numberDisplay type of both the device Login procedure Default AUX port propertiesConnecting the AUX port to a terminal Power on the device and press Enter at the prompt Displaying and maintaining CLI login Task Command RemarksInclude regular-expression Regular-expressionSend all num1 aux console Available in user view Vty num2 Logging in by using the default Web login settings Configuration guidelinesLogging in to the Web interface Adding a Web login account Configuring Web loginConfiguring Http login Basic Web login configuration requirementsObject Requirements Web captcha verification-codeInterface interface-type Interface-number Configuring Https loginVerification-code VPN Configuration Guide Policy-nameHttps Mask mask-lengthDisplaying and maintaining Web login Http login configuration exampleConfiguration procedure Network requirementsHttps login configuration example # Associate the Https service with SSL server policy myssl # Enable the Https serviceConfigure the host Https client # Create RSA local key pairsTroubleshooting Web browser Failure to access the device through the Web interfaceSymptom Configuring the Internet Explorer settingsInternet Explorer setting Configuring Firefox Web browser settings Click OK in the Security Settings dialog boxFirefox Web browser setting Accessing the device through Snmp Configuring Snmp accessConfiguring SNMPv3 access PrerequisitesConfiguring SNMPv1 or SNMPv2c access Ipv6 ipv6-acl-number See Getting Started Command ReferencePriv-password acl acl-number acl ipv6 ipv6-acl-number Notify-view acl acl-number aclSnmp login example StepCommand Remarks# Enable the Snmp agent # Configure an Snmp groupPage Logging in to the firewall module from the network device Feature and hardware compatibilityLogging in to the firewall module from the network device Resetting the system of the firewall module Configuring the Acsei protocolAcsei timers Configuring Acsei server on the network deviceAcsei starts up and runs in the following procedures Acsei startup and runningConfiguring Acsei client on the firewall module Displaying and maintaining Acsei server and clientNetwork requirements Client-idConfiguration procedure # Set the clock synchronization timer to 10 minutes# Set the monitoring timer to 10 seconds # Log in to the firewall modulePage Performing basic configuration in the Web interface Basic configurationOverview Basic configuration wizard-1/6 Click Next For basic configuration appearsBasic configuration wizard-2/6 basic information Click Next For configuring service management appearsBasic configuration wizard-3/6 service management Another service Assign IP addresses to the interfacesClick Next For configuring NAT appears Configuration itemsConfigure the parameters as described in Table IP/Wildcard Performing basic configuration at the CLI Basic configuration wizard-6/6Global-name Interface interface-typeIp address ip-address mask-length mask Zone name zone-name id zone-idConfiguration Configuring the device name in the Web interface Configuring the device name at the CLIManaging the device Hardware Supported storage mediumConfiguring the system time Configuring the system time in the Web interfaceDisplaying the current system time Configuring the network time CalendarConfiguring the time zone and daylight saving time Source InterfaceDate and time configuration example This example, Device a is the firewallConfiguring the local clock as the reference clock Configuring the system time at the CLI Configuration guidelinesSystem time configuration results Date-timeZone-offset Date-time ± zone-offsetZone-offset + To change the system time Date-time ± zone-offset +Summer-offset Both date-timeSetting the idle timeout timer at the CLI Setting the idle timeout timer in the Web interfaceTo set the idle timeout timer Configuring banners To enable displaying the copyright statementEnabling displaying the copyright statement Banner message input modesConfiguring the maximum number of concurrent users To configure bannersRebooting the device Configuring the exception handling methodRebooting the firewall in the Web interface Rebooting devices immediately at the CLI Rebooting the firewall at the CLIScheduling a device reboot Scheduling jobs Job configuration approachesComparison of non-modular and modular approaches Scheduling a job in the non-modular approach Scheduling a job in the modular approachJob job-name View view-nameTime time-id at time date command command Scheduled job configuration example# Create a job named pc1, and enter its view Setting the port status detection timer # Create a job named pc2, and enter its view# Create a job named pc3, and enter its view # Display information about scheduled jobsConfiguring temperature thresholds for a device or a module Configuring basic temperature thresholdsConfiguring advanced temperature thresholds To set the port status detection timerMonitoring an NMS-connected interface Clearing unused 16-bit interface indexes Verifying and diagnosing transceiver modules Verifying transceiver modulesDiagnosing transceiver modules Interface-number beginDisplaying and maintaining device management Command ReferenceSee Getting Started Task Command Remarks Task Command Remarks Managing users Configuring a local user in the Web interfaceUser levels Configure a local user, as described in Table Click Apply Click AddService type feature and hardware compatibility Configuration exampleItem Description Controlling user logins Configuring a local user at the CLIConfiguring Telnet login control Configuring source IP-based Telnet login control Source sour-addr sour-wildcardVpn-instancevpn-instance-name Ipv6-address prefix-lengthConfiguring source MAC-based Telnet login control Telnet login control configuration exampleRule-string Configuring source IP-based Snmp login control Getting StartedSnmp login control configuration example Ipv6 ipv6-acl-numberRead-view write-viewwrite-view Group-name acl acl-number acl ipv6Configuring Web login control Configuring source IP-based Web login controlWeb login control configuration example Logging off online Web usersSource sour-addr sour-wildcard N/A any time-range User-id user-nameuser-nameDisplaying online users Field DescriptionUsing the CLI Command conventionsCommand conventions Convention DescriptionUsing the undo form of a command CLI viewsTask Command Entering system view from user viewReturning to the upper-level view from any view Returning to user view from any other viewAccessing the CLI online help Entering a command Editing a command lineAbbreviating commands Command line editing keysConfiguring and using command keyword aliases Configuring and using hotkeysTo configure a command keyword alias Usage guidelinesSystem-reserved hotkeys Enabling redisplaying entered-but-not-submitted commandsHotkey Function Understanding command-line error messages Using the command history functionCommon command-line error messages Error message CauseViewing history commands Setting the command history buffer size for user interfacesPausing between screens of output Controlling the CLI outputSpecial characters supported in a regular expression Filtering the output from a display commandCharacter Meaning Examples Contain stringstring. string1string2\2 repeats String1string2string2. string1string2\1\2String1string2string1string2 Matches character1character2Configuring user privilege and command levels A being character2, but does not match 2aCommand levels and user privilege levels Configuring a user privilege levelLevel Privilege Default set of commands Management and Maintenance Last-num1 vty first-num2 Last-num2By default, the user privilege level Switching the user privilege level Authentication mode Keywords Description Privilege level switching authentication modesInformation, see Access Control Configuration Guide Switching to a higher user privilege level Information required for user privilege level switchingSaving the running configuration Changing the level of a commandTo change the level of a command View commandContacting HP Support and other resourcesRelated information Command conventions SymbolsConventions GUI conventionsNetwork topology icons Port numbering in examplesIndex 144
Related manuals
Manual 3 pages 45.38 Kb