Configuring The Device; Configuring Authentication On A User Interface; Configuring The Basic Access Function - H3C S12500G-EF Series Installation Manual

Table of Contents

Advertisement

Booting Normal Extend Bootware
...
System image is starting...
Line aux0 is available.
Press ENTER to get started.
Press Enter at the prompt. When the prompt
After powering on the device, check the following items:
The cooling system is working, and you can hear fan rotating noise and feel air being blown out.
The system status LEDs on the MPUs show that the system is operating normally. For more
information about LED behaviors, see H3C S12500G-EF Switch Series Hardware Information
and Specifications.

Configuring the device

By default, the device does not authenticate the console login user at an AUX interface. To increase
system security and enable remote management:
Configure remote access services, for example, Telnet or SSH.
Configure authentication on each user interface, including the AUX interfaces.

Configuring authentication on a user interface

You can configure authentication on a user interface to control access to the device.
Table 4-1
describes the Telnet login authentication methods available for a VTY user line.
Table 4-1 Telnet login authentication methods
Authentication method
None
Password
Username and password
For more information about login methods, see H3C S12500G-EF Switch Series Fundamentals
Configuration Guide.

Configuring the basic access function

The device without any configuration can perform basic data forwarding immediately after it is
connected to a network. To implement more forwarding features, configure the basic network
settings in
Table 4-2
Table 4-2 Basic network settings
Setting
IP address
Feature
Easy to configure, allows any user
to Telnet to your device, and
lowest in security
Easy to configure, secure, and flat
user management
Complex to configure, secure, and
hierarchical user management
on the device.
Description
Enables remote device management, for example, by using Telnet.
appears, you can configure the device.
<Sysname>
Application scenarios
Lab environments and extremely
secure network environments
Environments that do not need
granular privilege management
Environments where multiple user
roles cooperate to manage the device
4-3

Advertisement

Table of Contents
loading

This manual is also suitable for:

S12516g-efS12508g-ef

Table of Contents