Login Overview; Fips Compliance; Login Methods At A Glance - HP 6125XLG Configuration Manual

Blade switch fundamentals configuration guide
Table of Contents

Advertisement

Login overview

At the first startup, the device uses the default configuration file. The first time you access the device, you
can only log in to the CLI through the console or AUX port. After login, you can change console or AUX
login parameters or configure other access methods, including Telnet, SSH, and SNMP.

FIPS compliance

The device supports the FIPS mode that complies with NIST FIPS 140-2 requirements. Support for features,
commands, and parameters might differ in FIPS mode and non-FIPS mode. For more information about
FIPS mode, see Security Configuration Guide.
In FIPS mode, the device does not support Telnet login.

Login methods at a glance

Table 7 Login methods at a glance
Login method
Logging in to the
Logging in through the
console/AUX port locally
Logging in through Telnet (not
supported in FIPS mode)
Logging in through SSH
Default settings and minimum configuration requirements
CLI:
The first time you access the device, login through the console or AUX
port is enabled, no username or password is required, and the user
role network-admin is assigned. After login, configure password or
scheme authentication mode to improve device security.
By default, Telnet login is disabled.
To Log in through Telnet, complete the following configuration tasks:
By default, SSH login is disabled.
To log in through SSH, complete the following configuration tasks:
Enable the Telnet server function.
Assign an IP address to a Layer 3 interface and make sure the
interface and the Telnet client can reach each other.
Configure an authentication mode for VTY login users. By default,
password authentication is used but no password is configured.
Assign a user role to VTY login users (network-operator by default).
Enable the SSH server function and configure SSH attributes.
Assign an IP address to a Layer 3 interface and make sure the
interface and the SSH client can reach each other.
Configure scheme authentication for VTY login users (password
authentication by default).
Assign a user role to VTY login users (network-operator by default).
15

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents