Huawei Quidway S2700 Series Configuration Manual page 7

Hide thumbs Also See for Quidway S2700 Series:
Table of Contents

Advertisement

Quidway S2700 Series Ethernet Switches
Configuration Guide - Basic Configuration
5.1.2 User Authentication.................................................................................................................................47
5.2 Logging In to the S2700 Through the Console Port.........................................................................................49
5.2.1 Establishing the Configuration Task.......................................................................................................49
5.2.2 Logging In to the S2700 Through the Console Interface........................................................................50
5.3 Configuring Console User Interface.................................................................................................................53
5.3.1 Establishing the Configuration Task.......................................................................................................53
5.3.2 Configuring Console Interface Attributes...............................................................................................54
5.3.3 Setting Console Terminal Attributes.......................................................................................................55
5.3.4 Configuring User Priority........................................................................................................................56
5.3.5 Configuring User Authentication............................................................................................................57
5.3.6 Checking the Configuration.....................................................................................................................58
5.4 Configuring VTY User Interface......................................................................................................................58
5.4.1 Establishing the Configuration Task.......................................................................................................58
5.4.2 Configuring Maximum VTY User Interfaces.........................................................................................59
5.4.3 (Optional)Configuring Limits for Incoming Calls and Outgoing Calls..................................................60
5.4.4 Configuring VTY Terminal Attributes....................................................................................................60
5.4.5 Configuring User Authentication............................................................................................................61
5.4.6 Checking the Configuration.....................................................................................................................63
5.5 Managing User Interfaces.................................................................................................................................63
5.5.1 Establishing the Configuration Task.......................................................................................................63
5.5.2 Sending Messages to Other User Interfaces............................................................................................64
5.5.3 Clearing Online User...............................................................................................................................64
5.5.4 Checking the Configuration.....................................................................................................................65
5.6 Configuring User Management........................................................................................................................65
5.6.1 Establishing the Configuration Task.......................................................................................................65
5.6.2 Configuring Authentication Mode...........................................................................................................66
5.6.3 Configuring Authentication Password.....................................................................................................66
5.6.4 Setting Username and Password for AAA Local Authentication...........................................................67
5.6.5 Configuring Non-Authentication.............................................................................................................67
5.6.6 Configuring User Priority........................................................................................................................68
5.6.7 Checking the Configuration.....................................................................................................................68
5.7 Configuration Examples...................................................................................................................................69
5.7.1 Example for Configuring Logging In to the Switch Through Password.................................................69
5.7.2 Example for Logging In to the Device Through AAA............................................................................70
6 File System Management...........................................................................................................72
6.1 Overview of the File System............................................................................................................................73
6.2 Managing a Storage Device..............................................................................................................................73
6.2.1 Establishing the Configuration Task.......................................................................................................73
6.2.2 Restoring Storage Devices with File System Troubles...........................................................................74
6.2.3 (Optional) Formatting a Storage Device.................................................................................................74
6.3 Managing the Directory....................................................................................................................................74
6.3.1 Establishing the Configuration Task.......................................................................................................74
Issue 01 (2011-07-15)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
Contents
vi

Advertisement

Table of Contents
loading

Table of Contents