Dil ID: 8
Dil Adı: italy
Dil Kodu: it5tayfun Prodotti del Marchio H3c-technologies
Dünyanın En Büyük
Elektronik Bilgi Kütüphanesi



ii
Login Procedure ······························································································································3-2
Console Login Authentication Modes······························································································3-5
Configuring None Authentication for Console Login ·······································································3-6
Configuring Password Authentication for Console Login································································3-7
Configuring Scheme Authentication for Console Login···································································3-9
Configuring Common Settings for Console Login (Optional) ························································3-12
Logging In Through Telnet····················································································································3-15
Introduction····································································································································3-15
Telnet Login Authentication Modes·······························································································3-16
Configuring None Authentication for Telnet Login ········································································3-17
Configuring Password Authentication for Telnet Login ·································································3-18
Configuring Scheme Authentication for Telnet Login····································································3-19
Configuring Common Settings for VTY User Interfaces (Optional)···············································3-23
Configuring the Device to Log In to Another Device as a Telnet Client········································3-25
Logging In Through SSH ······················································································································3-26
Introduction····································································································································3-26
Configuring the SSH Server··········································································································3-27
Configuring the SSH Client to Log In to the SSH Server ······························································3-29
Logging In Through Modems················································································································3-30
Introduction····································································································································3-30
Configuration Requirements··········································································································3-30
Login Procedure ····························································································································3-30
Modem Login Authentication Modes·····························································································3-34
Configuring None Authentication for Modem Login ······································································3-35
Configuring Password Authentication for Modem Login ·······························································3-36
Configuring Scheme Authentication for Modem Login··································································3-37
Configuring Common Settings for Modem Login (Optional) ·························································3-41
Displaying and Maintaining CLI Login···································································································3-44
4 NMS Login··················································································································································4-1
NMS Login Overview ······························································································································4-1
Configuring NMS Login···························································································································4-1
NMS Login Example ·······························································································································4-3
5 User Login Control ····································································································································5-1
User Login Control Overview··················································································································5-1
Configuring Login Control over Telnet Users··························································································5-1
Configuration Preparation ···············································································································5-1
Configuring Source IP-Based Login Control over Telnet Users······················································5-1
Configuring Source and Destination IP-Based Login Control over Telnet Users ···························5-2
Configuring Source MAC-Based Login Control over Telnet Users·················································5-3
Source MAC-Based Login Control Configuration Example·····························································5-3
Configuring Source IP-Based Login Control over NMS Users ·······························································5-4
Configuration Preparation ···············································································································5-4
Configuring Source IP-Based Login Control over NMS Users························································5-4
Source IP-Based Login Control Over NMS Users Configuration Example·····································5-5