i
Table of Contents
1 Logging In to an Ethernet Switch············································································································ 1-1
Logging In to an Ethernet Switch············································································································1-1
Introduction to the User Interface············································································································1-1
Supported User Interfaces ··············································································································1-1
Relationship Between a User and a User Interface········································································1-2
User Interface Index························································································································1-2
Common User Interface Configuration····························································································1-3
2 Logging In Through the Console Port·····································································································2-1
Introduction ·············································································································································2-1
Setting Up a Login Environment for Login Through the Console Port····················································2-1
Console Port Login Configuration···········································································································2-3
Common Configuration····················································································································2-3
Console Port Login Configurations for Different Authentication Modes················································· 2-5
Console Port Login Configuration with Authentication Mode Being None··············································2-6
Configuration Procedure··················································································································2-6
Configuration Example····················································································································2-6
Console Port Login Configuration with Authentication Mode Being Password······································2-7
Configuration Procedure··················································································································2-7
Configuration Example····················································································································2-8
Console Port Login Configuration with Authentication Mode Being Scheme·········································2-9
Configuration Procedure··················································································································2-9
Configuration Example··················································································································2-10
3 Logging In Through Telnet·······················································································································3-1
Introduction ·············································································································································3-1
Common Configuration to Control Telnet Access···················································································3-1
Telnet Configurations for Different Authentication Modes·······························································3-3
Telnet Configuration with Authentication Mode Being None·································································· 3-4
Configuration Procedure··················································································································3-4
Configuration Example····················································································································3-4
Telnet Configuration with Authentication Mode Being Password···························································3-5
Configuration Procedure··················································································································3-5
Configuration Example····················································································································3-6
Telnet Configuration with Authentication Mode Being Scheme······························································3-7
Configuration Procedure··················································································································3-7
Configuration Example····················································································································3-8
Telnetting to a Switch······························································································································3-9
Telnetting to a Switch from a Terminal····························································································3-9
Telnetting to another Switch from the Current Switch···································································3-11
4 Logging In Using a Modem·······················································································································4-1
Introduction ·············································································································································4-1
Configuration on the Switch Side············································································································4-1
Modem Configuration······················································································································4-1