beautypg.com

H3C Technologies H3C S7500E Series Switches User Manual

Page 8

background image

ii

Login Procedure ······························································································································3-2

Console Login Authentication Modes······························································································3-5

Configuring None Authentication for Console Login ·······································································3-6

Configuring Password Authentication for Console Login ································································3-7

Configuring Scheme Authentication for Console Login···································································3-9

Configuring Common Settings for Console Login (Optional) ························································3-12

Logging In Through Telnet ····················································································································3-15

Introduction····································································································································3-15

Telnet Login Authentication Modes ·······························································································3-16

Configuring None Authentication for Telnet Login ········································································3-17

Configuring Password Authentication for Telnet Login ·································································3-18

Configuring Scheme Authentication for Telnet Login····································································3-19

Configuring Common Settings for VTY User Interfaces (Optional)···············································3-23

Configuring the Device to Log In to Another Device as a Telnet Client ········································3-25

Logging In Through SSH ······················································································································3-26

Introduction····································································································································3-26

Configuring the SSH Server ··········································································································3-27

Configuring the SSH Client to Log In to the SSH Server ······························································3-29

Logging In Through Modems ················································································································3-30

Introduction····································································································································3-30

Configuration Requirements··········································································································3-30

Login Procedure ····························································································································3-30

Modem Login Authentication Modes ·····························································································3-34

Configuring None Authentication for Modem Login ······································································3-35

Configuring Password Authentication for Modem Login ·······························································3-36

Configuring Scheme Authentication for Modem Login··································································3-37

Configuring Common Settings for Modem Login (Optional) ·························································3-41

Displaying and Maintaining CLI Login···································································································3-44

4 NMS Login ··················································································································································4-1

NMS Login Overview ······························································································································4-1

Configuring NMS Login ···························································································································4-1

NMS Login Example ·······························································································································4-3

5 User Login Control ····································································································································5-1

User Login Control Overview ··················································································································5-1

Configuring Login Control over Telnet Users··························································································5-1

Configuration Preparation ···············································································································5-1

Configuring Source IP-Based Login Control over Telnet Users······················································5-1

Configuring Source and Destination IP-Based Login Control over Telnet Users ···························5-2

Configuring Source MAC-Based Login Control over Telnet Users ·················································5-3

Source MAC-Based Login Control Configuration Example·····························································5-3

Configuring Source IP-Based Login Control over NMS Users ·······························································5-4

Configuration Preparation ···············································································································5-4

Configuring Source IP-Based Login Control over NMS Users························································5-4

Source IP-Based Login Control Over NMS Users Configuration Example·····································5-5