HP 5120 series Configuration Manual page 4

Gigabit ethernet switches
Table of Contents

Advertisement

Telnet login authentication modes ······················································································································· 37
Configuring none authentication for telnet login ······························································································· 38
Configuring password authentication for telnet login ······················································································· 39
Configuring scheme authentication for telnet login ··························································································· 40
Configuring common settings for VTY user interfaces (optional) ······································································ 44
Configuring the device to log in to a telnet server as a telnet client ································································ 45
Logging in through SSH ················································································································································ 46
Configuring the SSH server ·································································································································· 47
Configuring the SSH client to log in to the SSH server ····················································································· 50
Logging in through modems ········································································································································· 51
Configuration requirements ·································································································································· 51
Login procedure ····················································································································································· 51
Modem login authentication modes ···················································································································· 54
Configuring none authentication for modem login ···························································································· 55
Configuring password authentication for modem login ···················································································· 55
Configuring scheme authentication for modem login ······················································································· 56
Configuring common settings for modem login (optional) ················································································ 59
Displaying and maintaining CLI login ························································································································· 62
Web login ·································································································································································· 63
Web login overview ······················································································································································ 63
FIPS compliance ····························································································································································· 64
Configuring HTTP login ················································································································································· 64
Configuring HTTPS login ··············································································································································· 65
Displaying and maintaining web login ······················································································································· 67
Web login example ······················································································································································· 67
HTTP login example ·············································································································································· 67
HTTPS login example ············································································································································ 69
NMS login ·································································································································································· 72
NMS login overview ······················································································································································ 72
Configuring NMS login ················································································································································· 72
NMS login example······················································································································································· 74
User login control ······················································································································································· 75
User login control overview ·········································································································································· 75
FIPS compliance ····························································································································································· 75
Configuring login control over telnet users ·················································································································· 75
Configuration preparation ···································································································································· 75
Configuring source IP-based login control over telnet users ············································································· 76
Configuring source and destination IP-based login control over telnet users ················································· 76
Configuring source MAC-based login control over telnet users ······································································· 77
Source MAC-based login control configuration example ················································································· 77
Configuring source IP-based login control over NMS users ······················································································ 78
Configuration preparation ···································································································································· 78
Configuring source IP-based login control over NMS users ············································································· 78
Source IP-based login control over NMS users configuration example ·························································· 79
Configuring source IP-based login control over web users ······················································································· 80
Configuration preparation ···································································································································· 80
Configuring source IP-based login control over web users ··············································································· 80
Logging off online web users ······························································································································· 81
Source IP-based login control over web users configuration example ···························································· 81
FTP configuration ························································································································································ 83
FTP overview ··································································································································································· 83
Introduction to FTP ················································································································································· 83
ii
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents