i
Table of Contents
1 Logging into an Ethernet Switch ·············································································································1-1
Logging into an Ethernet Switch ·············································································································1-1
Introduction to the User Interface············································································································1-1
Supported User Interfaces ··············································································································1-1
User Interface Index························································································································1-1
Common User Interface Configuration····························································································1-2
2 Logging in through the Console Port······································································································2-1
Introduction ·············································································································································2-1
Logging in through the Console Port ······································································································2-1
Console Port Login Configuration···········································································································2-4
Common Configuration····················································································································2-4
Console Port Login Configurations for Different Authentication Modes··········································2-4
Console Port Login Configuration with Authentication Mode Being None··············································2-5
Configuration Procedure··················································································································2-5
Configuration Example ····················································································································2-7
Console Port Login Configuration with Authentication Mode Being Password ······································2-8
Configuration Procedure··················································································································2-8
Configuration Example ····················································································································2-9
Console Port Login Configuration with Authentication Mode Being Scheme·······································2-10
Configuration Procedure················································································································2-10
Configuration Example ··················································································································2-12
3 Logging in through Telnet························································································································3-1
Introduction ·············································································································································3-1
Common Configuration····················································································································3-1
Telnet Configurations for Different Authentication Modes·······························································3-2
Telnet Configuration with Authentication Mode Being None ··································································3-3
Configuration Procedure··················································································································3-3
Configuration Example ····················································································································3-4
Telnet Configuration with Authentication Mode Being Password···························································3-5
Configuration Procedure··················································································································3-5
Configuration Example ····················································································································3-6
Telnet Configuration with Authentication Mode Being Scheme······························································3-7
Configuration Procedure··················································································································3-7
Configuration Example ··················································································································3-10
Telnetting to a Switch····························································································································3-11
Telnetting to a Switch from a Terminal··························································································3-11
Telnetting to another Switch from the Current Switch···································································3-13
4 Logging in Using a Modem·······················································································································4-1
Introduction ·············································································································································4-1