Configuring The Switch; Configuring Authentication On A User Interface; Configuring The Basic Access Function - H3C S12500X-2L Installation Manual

Hide thumbs Also See for S12500X-2L:
Table of Contents

Advertisement

Press Ctrl+T to start memory test
Booting Normal Extended BootWare
The Extended BootWare is self-decompressing..........Done.
...
Press ENTER to get started.
Press Enter at the prompt. When the prompt
After powering on the switch, check the following items:
The cooling system is working, and you can hear fan rotating noise and feel air being blown out.
The system status LEDs on the SEUs show that the system is operating normally. For more
information about LED behaviors, see "Appendix C LEDs."

Configuring the switch

By default, the switch does not authenticate the console login user at an AUX interface. To increase
system security and enable remote management:
Configure remote access services, for example, Telnet or SSH.
Configure authentication on each user interface, including the AUX interfaces.

Configuring authentication on a user interface

You can configure authentication on a user interface to control access to the switch.
Table1-1
describes the Telnet login authentication methods available for a VTY user line.
Table1-1 Telnet login authentication methods
Authentication method
None
Password
Username and password
For more information about login methods, see H3C S12500X-AF Switch Series Fundamentals
Configuration Guide.

Configuring the basic access function

The switch without any configuration can perform basic data forwarding immediately after it is
connected to a network. To implement more forwarding features, configure the basic network
settings in
Table1-2
Table1-2 Basic network settings
Setting
IP address
Static routes
VLANs
Feature
Easy to configure, allows any user
to Telnet to your switch, and lowest
in security
Easy to configure, secure, and flat
user management
Complex to configure, secure, and
hierarchical user management
on the switch.
Description
Enables remote switch management, for example, by using Telnet.
Implement static routing.
Divide the LAN into multiple VLANs for data security.
appears, you can configure the switch.
<Sysname>
Application scenarios
Lab environments and extremely
secure network environments
Environments that do not need
granular privilege management
Environments where multiple user
roles cooperate to manage the switch
1-3

Advertisement

Table of Contents
loading

Table of Contents