Telnet login authentication modes ······················································································································· 37 Configuring none authentication for Telnet login ······························································································ 38 Configuring password authentication for Telnet login ······················································································ 39 Configuring scheme authentication for Telnet login ·························································································· 41 Configuring common settings for VTY user interfaces (optional)······································································ 45 Configuring the device to log in to a Telnet server as a Telnet client······························································ 46

Logging in through SSH ················································································································································ 47 Introduction ···························································································································································· 47 Configuring the SSH server·································································································································· 48 Configuring the SSH client to log in to the SSH server ····················································································· 51 Logging in through modems ········································································································································· 52 Introduction ···························································································································································· 52 Configuration requirements·································································································································· 52 Login procedure····················································································································································· 52 Modem login authentication modes···················································································································· 55 Configuring none authentication for modem login···························································································· 56 Configuring password authentication for modem login···················································································· 57 Configuring scheme authentication for modem login ······················································································· 58 Configuring common settings for modem login (optional)················································································ 62 Displaying and maintaining CLI login ························································································································· 64

Web login ··································································································································································66

Web login overview ······················································································································································ 66 Configuring HTTP login ················································································································································· 66 Configuring HTTPS login ··············································································································································· 67 Displaying and maintaining web login ······················································································································· 70 Web login example······················································································································································· 70

HTTP login example ·············································································································································· 70 HTTPS login example ············································································································································ 71

NMS login ··································································································································································74

NMS login overview······················································································································································ 74 Configuring NMS login················································································································································· 74 NMS login example······················································································································································· 75

User login control·······················································································································································78

User login control methods ··········································································································································· 78 Configuring login control over Telnet users················································································································· 78 Configuration preparation···································································································································· 78 Configuring source IP-based login control over Telnet users ············································································ 78 Configuring source and destination IP-based login control over Telnet users ················································ 79 Configuring source MAC-based login control over Telnet users······································································ 79 Source MAC-based login control configuration example················································································· 80 Configuring source IP-based login control over NMS users······················································································ 81 Configuration preparation···································································································································· 81 Configuring source IP-based login control over NMS users············································································· 81 Source IP-based login control over NMS users configuration example ·························································· 82 Configuring source IP-based login control over web users ······················································································· 83 Configuration preparation···································································································································· 83 Configuring source IP-based login control over web users··············································································· 83 Logging off online web users ······························································································································· 83 Source IP-based login control over web users configuration example ···························································· 84

FTP configuration························································································································································85

FTP overview··································································································································································· 85 Introduction to FTP················································································································································· 85

ii