3Com 4510G Configuration Manual page 852

3com switch 4510g family
Table of Contents

Advertisement

1 Logging In to an Ethernet Switch ............................................................................................................1-1
Logging In to an Ethernet Switch ............................................................................................................1-1
Introduction to User Interface..................................................................................................................1-1
Supported User Interfaces ..............................................................................................................1-1
Users and User Interfaces...............................................................................................................1-2
User Interface Number ....................................................................................................................1-2
Common User Interface Configuration............................................................................................1-2
2 Logging In Through the Console Port.....................................................................................................2-1
Introduction .............................................................................................................................................2-1
Setting Up the Connection to the Console Port ......................................................................................2-1
Console Port Login Configuration ...........................................................................................................2-3
Common Configuration....................................................................................................................2-3
Console Port Login Configuration with Authentication Mode Being None..............................................2-5
Configuration Procedure..................................................................................................................2-5
Configuration Example ....................................................................................................................2-6
Configuration Procedure..................................................................................................................2-7
Configuration Example ....................................................................................................................2-7
Configuration Procedure..................................................................................................................2-9
Configuration Example ..................................................................................................................2-10
Configuring Command Authorization ....................................................................................................2-11
Configuring Command Accounting .......................................................................................................2-12
3 Logging In Through Telnet/SSH...............................................................................................................3-1
Logging In Through Telnet......................................................................................................................3-1
Introduction......................................................................................................................................3-1
Common Configuration....................................................................................................................3-3
Telnet Login Configuration Task List...............................................................................................3-4
Telnet Login Configuration with Authentication Mode Being None.................................................3-5
Telnet Login Configuration with Authentication Mode Being Password..........................................3-6
Telnet Login Configuration with Authentication Mode Being Scheme ............................................3-8
Logging In Through SSH ......................................................................................................................3-10
Configuring Command Authorization ....................................................................................................3-10
Configuring Command Accounting .......................................................................................................3-11
4 User Interface Configuration Examples ..................................................................................................4-1
User Authentication Configuration Example ...........................................................................................4-1
Network diagram .............................................................................................................................4-1
Configuration procedure ..................................................................................................................4-1
Command Authorization Configuration Example....................................................................................4-2
Network diagram .............................................................................................................................4-2
Table of Contents
i

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents