Logging In to an Ethernet Switch ············································································································1-1
Supported User Interfaces ··············································································································1-1
Users and User Interfaces···············································································································1-2
User Interface Number ····················································································································1-2
Introduction ·············································································································································2-1
Console Port Login Configuration ···········································································································2-3
Common Configuration····················································································································2-3
Console Port Login Configurations for Different Authentication Modes··········································2-5
Console Port Login Configuration with Authentication Mode Being None··············································2-5
Configuration Procedure··················································································································2-5
Configuration Example ····················································································································2-6
Console Port Login Configuration with Authentication Mode Being Password ······································2-7
Configuration Procedure··················································································································2-7
Configuration Example ····················································································································2-7
Console Port Login Configuration with Authentication Mode Being Scheme ·········································2-9
Configuration Procedure··················································································································2-9
Configuration Example ··················································································································2-10
Configuring Command Authorization ····································································································2-11
Configuring Command Accounting ·······································································································2-12
3 Logging In Through Telnet/SSH···············································································································3-1
Logging In Through Telnet······················································································································3-1
Introduction······································································································································3-1
Telnet Connection Establishment····································································································3-1
Common Configuration····················································································································3-4
Logging In Through SSH ······················································································································3-10
Network diagram ·····························································································································4-1
Configuration procedure ··················································································································4-1
Network diagram ·····························································································································4-2
Table of Contents
i