Powering on the switch, Configuring the switch, Configuring login authentication modes – H3C Technologies H3C S9800 Series Switches User Manual
Page 49
41
Powering on the switch
Before powering on the switch, confirm the following:
•
The switch has been securely mounted.
•
All the cards have been correctly installed.
•
The unused slots have been installed with filler panels.
•
All the network cables, fibers, power cables, and grounding cables have been correctly connected.
•
The input power voltage meets the requirement of the switch.
•
The console cable is correctly connected, the terminal used for configuration has started, and the
configuration parameters have been set for the terminal.
Power on the switch. During the startup process, you can access BootWare menus to perform tasks such
as software upgrade and file management. The BootWare interface and menu options differ with
software versions. For more information about BootWare menu options, see the software-matching
release notes for the switch.
After the startup completes, you can access the CLI to configure the switch.
After powering on the switch, verify the following items:
•
The cooling system is operating, and you can hear fan rotating and feel air being blown out.
•
The LEDs show that the system is operating correctly. For more information about LEDs, see
"
."
Configuring the switch
The first time you access the switch, you can only log in to the CLI through the console port, and no
authentication is required. To increase system security and enable remote management, you can do the
following at the first login:
•
Configure other login methods, for example, Telnet, SSH, or NMS.
•
Assign user roles.
•
Configure login authentication modes.
•
Configure the basic access function.
Configuring login authentication modes
You can configure login authentication modes to control access to the switch.
describes the Telnet login authentication methods available for a VTY user line.
Table 5 Telnet login authentication methods
Authentication method Feature
Application scenarios
None
Easy to configure, allows any user to Telnet to
your switch, and lowest in security
Lab environments and extremely
secure network environments
Password
Easy to configure, secure, and flat user
management
Environments that do not need
granular privilege management