beautypg.com

Starting a management session, Local management, Telnet management – Allied Telesis IE200 Series User Manual

Page 59: Local management telnet management

background image

Chapter 5: Powering on the Switch

AT-IE200 Series Installation Guide

59

Starting a Management Session

You can use the following methods and tools to manage the switch:

Local management

Telnet client

Secure shell client

HTTP non-secure and HTTPs secure Web browser

SNMPv1, v2C, v3

Local Management

Local management uses the console port on the switch. It is commonly referred to as out-of-band
management because the management sessions are not conducted over your network. The requirements for
local management are:

A terminal or computer with a terminal emulator program

An RJ-45 management cable

This management method uses the command line interface, which gives you access to all of the features and
parameters on the switch. For instructions on how to start a local management session, refer to “Starting a
Local Management Session” on page 61.

Telnet Management

The switch has a Telnet server. You can use the server to manage the unit over your network with the
Telnet application protocol. It is commonly referred to as in-band management because it is conducted over
the network. The requirements for Telnet management are:

Your management workstation must have a Telnet client.

The Telnet server on the switch must be activated. By default, the Telnet server is
activated.

The switch must have an IP address, either from DHCP or statically assigned.

You must be able to reach the switch from your management workstation.

Telnet management uses the command-line interface, giving you access to all of the features and parameter
settings on the switch.

Telnet management sessions are not secure and are vulnerable to snooping because the packets exchanged
between the switch and your workstation are sent in plain text. The security of the switch may be
jeopardized if an intruder captures the packet containing your username and password. For secure remote
management, see “Secure Shell Management” on page 60.