Initially Configuring The Switch; Configuring A Login Authentication Method - HP JG221A Installation Manual

A3100 v2 switch series
Table of Contents

Advertisement

User interface aux0 is available.
Press ENTER to get started.
Press Enter at the prompt, and you can configure the switch when the prompt <HP> appears.
For more information about initial switch configuration, see

Initially configuring the switch

By default, the administrator can only log in to the switch through the console port without any authentication.
The default login method does not facilitate remote maintenance and management of the switch, and brings
vulnerabilities to the switch. After the first login, you can perform the following configurations.
Configure the login method so that you can remotely maintain and manage the switch and control login
user privileges.
Configure the access function of the switch to satisfy the requirements of different users.

Configuring a login authentication method

By configuring the authentication mode and the corresponding username, authentication method, and user
privilege level, you can perform login user privilege control, and improve switch security.
The switch supports login through the console port, telnet, SSH, and NMS.
The following section takes login through telnet for example. Login through telnet supports three login
authentication methods.
Table 8 Telnet login authentication methods
Authentication method
None
Password
Username and password
Feature
Easy to configure, allows any
user to Telnet to your switch, and
lowest in security
Easy to configure, allows any
user knowing the password to
telnet to your switch, high in
security, but incapable of
assigning different privilege
levels to different users
Complex to configure, allows
users inputting the correct
username and password to
Telnet to your switch, high in
security, and capable of
assigning different privilege
levels to different users
32
―Initially configuring the
Application scenarios
Lab environments and extremely secure
network environments
Environments that do not need granular
privilege management
Environments where multiple operators
cooperate to manage the switch
switch.‖

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents