Lenovo CN4093 Application Manual page 4

10gb converged scalable switch
Hide thumbs Also See for CN4093:
Table of Contents

Advertisement

4
CN4093 Application Guide for N/OS 8.3
Default Gateways . . . . . . . . . . . . . . . . . . . . . . . . . . 57
IP Routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
Setup Part 5: Final Steps . . . . . . . . . . . . . . . . . . . . . . . . . 59
Optional Setup for Telnet Support . . . . . . . . . . . . . . . . . . . . 60
Chapter 3. Switch Software Management . . . . . . . . . . . . . . 61
Loading New Software to Your Switch . . . . . . . . . . . . . . . . . . 62
Loading Software via the ISCLI . . . . . . . . . . . . . . . . . . . . 62
Loading Software via BBI . . . . . . . . . . . . . . . . . . . . . . 63
The Boot Management Menu . . . . . . . . . . . . . . . . . . . . . . 64
Boot Recovery Mode . . . . . . . . . . . . . . . . . . . . . . . . 65
Physical Presence . . . . . . . . . . . . . . . . . . . . . . . . . . 70
Part 2:. Securing the Switch . . . . . . . . . . . . . . . . . . . 71
Chapter 4. Securing Administration . . . . . . . . . . . . . . . . 73
Changing the Switch Passwords . . . . . . . . . . . . . . . . . . . . . 73
Changing the Default Administrator Password . . . . . . . . . . . . . 73
Changing the Default User Password . . . . . . . . . . . . . . . . . 73
Secure Shell and Secure Copy . . . . . . . . . . . . . . . . . . . . . . 74
Configuring SSH/SCP Features on the Switch. . . . . . . . . . . . . . 75
To Enable or Disable the SSH Feature . . . . . . . . . . . . . . . 75
To Enable or Disable SCP. . . . . . . . . . . . . . . . . . . . . 75
Configuring the SCP Administrator Password . . . . . . . . . . . . . 75
Using SSH and SCP Client Commands . . . . . . . . . . . . . . . . 75
To Log In to the Switch from the Client. . . . . . . . . . . . . . . 75
To Apply and Save the Configuration . . . . . . . . . . . . . . . 76
Generating RSA Host Key for SSH Access . . . . . . . . . . . . . . . 78
End User Access Control . . . . . . . . . . . . . . . . . . . . . . . . 79
Strong Passwords . . . . . . . . . . . . . . . . . . . . . . . . . . 79
User Access Control Menu . . . . . . . . . . . . . . . . . . . . . . 80
Setting Up User IDs . . . . . . . . . . . . . . . . . . . . . . . 80
Defining a User's Access Level . . . . . . . . . . . . . . . . . . 80
Validating a User's Configuration . . . . . . . . . . . . . . . . . 80
Enabling or Disabling a User . . . . . . . . . . . . . . . . . . . 80
Locking Accounts . . . . . . . . . . . . . . . . . . . . . . . . 80
Re-enabling Locked Accounts. . . . . . . . . . . . . . . . . . . 81
Listing Current Users . . . . . . . . . . . . . . . . . . . . . . . . 81
Logging In to an End User Account . . . . . . . . . . . . . . . . . . 81
Protected Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82
Stacking Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . 82

Advertisement

Table of Contents
loading

Table of Contents