i
Table of Contents
1 Logging In to an Ethernet Switch ............................................................................................................1-1
Logging In to an Ethernet Switch............................................................................................................1-1
Introduction to User Interface..................................................................................................................1-1
Supported User Interfaces ..............................................................................................................1-1
Users and User Interfaces...............................................................................................................1-2
User Interface Number....................................................................................................................1-2
Common User Interface Configuration............................................................................................1-2
2 Logging In Through the Console Port.....................................................................................................2-1
Introduction .............................................................................................................................................2-1
Setting Up the Connection to the Console Port......................................................................................2-1
Console Port Login Configuration...........................................................................................................2-3
Common Configuration....................................................................................................................2-3
Console Port Login Configurations for Different Authentication Modes..........................................2-5
Console Port Login Configuration with Authentication Mode Being None..............................................2-5
Configuration Procedure..................................................................................................................2-5
Configuration Example....................................................................................................................2-6
Console Port Login Configuration with Authentication Mode Being Password ......................................2-7
Configuration Procedure..................................................................................................................2-7
Configuration Example....................................................................................................................2-7
Console Port Login Configuration with Authentication Mode Being Scheme.........................................2-9
Configuration Procedure..................................................................................................................2-9
Configuration Example..................................................................................................................2-10
Configuring Command Authorization....................................................................................................2-11
Configuring Command Accounting .......................................................................................................2-12
3 Logging In Through Telnet/SSH...............................................................................................................3-1
Logging In Through Telnet......................................................................................................................3-1
Introduction......................................................................................................................................3-1
Telnet Connection Establishment....................................................................................................3-1
Common Configuration....................................................................................................................3-3
Telnet Login Configuration Task List...............................................................................................3-4
Telnet Login Configuration with Authentication Mode Being None.................................................3-5
Telnet Login Configuration with Authentication Mode Being Password..........................................3-6
Telnet Login Configuration with Authentication Mode Being Scheme ............................................3-8
Logging In Through SSH ......................................................................................................................3-10
Configuring Command Authorization....................................................................................................3-10
Configuring Command Accounting .......................................................................................................3-11
4 User Interface Configuration Examples..................................................................................................4-1
User Authentication Configuration Example...........................................................................................4-1
Network diagram .............................................................................................................................4-1
Configuration procedure..................................................................................................................4-1
Command Authorization Configuration Example....................................................................................4-2
Network diagram .............................................................................................................................4-2