Overview of Switch Login Components
Overview of Switch Login Components
Switch access components include access methods (or interfaces) and user accounts stored on the local
user database in the switch and/or on external authentication servers. Each access method, except the
console port, must be enabled or "unlocked" on the switch before users can access the switch through that
interface.
Authentication
Server
Management Interfaces
Logging into the switch may be done locally or remotely. Remote connections may be secure or insecure,
depending on the method. Management interfaces are enabled using the
This command also requires specifying the external servers and/or local user database that will be used to
authenticate users. The process of authenticating users to manage the switch is called Authenticated
Switch Access (ASA). Authenticated Switch Access is described in detail in
Security."
An overview of management methods is listed here:
Logging Into the CLI
•
Console port—A direct connection to the switch through the console port. The console port is always
enabled for the default user account, see
•
EMP Port—The Ethernet Management Port (EMP) allows you to bypass the Network Interface (NI)
modules and remotely manage the switch directly through the CMM., see
Address" on page 1-7
•
Telnet—Any standard Telnet client may be used for remote login to the switch. This method is not
secure. For more information about using Telnet to access the switch, see
•
Secure Shell—Any standard Secure Shell client may be used for remote login to the switch. See
"Using Secure Shell" on page
page 1-4
OmniSwitch
local user
database
Switch Login Components
"Configuring the Console Port" on page
1-9.
OmniSwitch AOS Release 7 Switch Management Guide
Login via Secure Shell, Telnet,
HTTP, or SNMP
local user
Login via the console port.
aaa authentication
Logging Into the Switch
remote user
command.
Chapter 7, "Managing Switch
1-6.
"Setting the EMP Port's IP
"Using Telnet" on page
March 2011
1-8.