i 
Table of Contents 
1 Logging In to an Ethernet Switch ············································································································1-1 
Logging In to an Ethernet Switch············································································································1-1 
Introduction to the User Interface············································································································1-1 
Supported User Interfaces ··············································································································1-1 
Relationship Between a User and a User Interface ········································································1-2 
User Interface Index························································································································1-2 
Common User Interface Configuration····························································································1-2 
2 Logging In Through the Console Port·····································································································2-1 
Introduction ·············································································································································2-1 
Setting Up a Login Environment for Login Through the Console Port····················································2-1 
Console Port Login Configuration···········································································································2-3 
Common Configuration····················································································································2-3 
Console Port Login Configurations for Different Authentication Modes ·················································2-5 
Console Port Login Configuration with Authentication Mode Being None··············································2-6 
Configuration Procedure··················································································································2-6 
Configuration Example ····················································································································2-6 
Console Port Login Configuration with Authentication Mode Being Password ······································2-7 
Configuration Procedure··················································································································2-7 
Configuration Example ····················································································································2-8 
Console Port Login Configuration with Authentication Mode Being Scheme·········································2-9 
Configuration Procedure··················································································································2-9 
Configuration Example ··················································································································2-10 
3 Logging In Through Telnet·······················································································································3-1 
Introduction ·············································································································································3-1 
Common Configuration to Control Telnet Access···········································································3-1 
Telnet Configurations for Different Authentication Modes·······························································3-3 
Telnet Configuration with Authentication Mode Being None ··································································3-4 
Configuration Procedure··················································································································3-4 
Configuration Example ····················································································································3-4 
Telnet Configuration with Authentication Mode Being Password···························································3-5 
Configuration Procedure··················································································································3-5 
Configuration Example ····················································································································3-6 
Telnet Configuration with Authentication Mode Being Scheme······························································3-7 
Configuration Procedure··················································································································3-7 
Configuration Example ····················································································································3-8 
Telnetting to a Switch······························································································································3-9 
Telnetting to a Switch from a Terminal····························································································3-9 
Telnetting to another Switch from the Current Switch···································································3-11 
4 Logging In Using a Modem·······················································································································4-1 
Introduction ·············································································································································4-1 
Configuration on the Switch Side············································································································4-1 
Modem Configuration······················································································································4-1