Configuration Procedure; Configuration Example; Telnet Login Configuration Task List; Telnet Login Configuration With Authentication Mode Being None - 3Com 4500G Family Configuration Manual

24/48 port
Hide thumbs Also See for 4500G Family:
Table of Contents

Advertisement

Telnet Login Configuration Task List

Telnet login configurations vary when different authentication modes are adopted.
Table 3-3 Telnet login configuration tasks when different authentication modes are adopted
Telnet Login Configuration with Authentication
Mode Being None
Telnet Login Configuration with Authentication
Mode Being Password
Telnet Login Configuration with Authentication
Mode Being Scheme

Telnet Login Configuration with Authentication Mode Being None

Configuration Procedure

Follow these steps to perform Telnet configuration (with authentication mode being none):
To do...
Enter system view
Enter one or more VTY user
interface views
Configure not to authenticate
users logging in to VTY user
interfaces
Note that if you configure not to authenticate the users, the command level available to users logging in
to a switch depends on both the authentication-mode none command and the user privilege level
level command.

Configuration Example

1)
Network requirements
Assume that you are a level 3 AUX user and want to perform the following configuration for Telnet users
logging in to VTY 0:
Do not authenticate users logging in to VTY 0.
Commands of level 2 are available to users logging in to VTY 0.
Telnet protocol is supported.
The screen can contain up to 30 lines.
The history command buffer can contain up to 20 commands.
The timeout time of VTY 0 is 6 minutes.
Task
Use the command...
system-view
user-interface vty first-number
[ last-number ]
authentication-mode none
Description
Configure not to authenticate users logging in user
interfaces
Configure to authenticate users logging in to user
interfaces using a local password and configure the
local password
Configure to authenticate users using the
scheme authentication mode;
Set the authentication scheme, which can be
local
authentication
authentication;
Configure the authentication usernames and
passwords for local users.
Required
By default, VTY users are
authenticated after logging in.
3-5
or
remote
server
Remarks

Hide quick links:

Advertisement

Chapters

Table of Contents
loading

Table of Contents