H3C Technologies H3C SecPath F1000-E User Manual
Page 252
i
Table of Contents
User Interface Configuration ······································································································································· 1
User Interface Overview···················································································································································1
Brief Introduction ······················································································································································1
Users and User Interfaces········································································································································2
Numbering User Interfaces······································································································································2
User Interface Configuration Task List·····························································································································3
Configuring Asynchronous Serial Interface Attributes···································································································3
Configuring Terminal Attributes·······································································································································4
Configuring Modem Attributes ········································································································································5
Configuring auto-execute command ·······························································································································5
Configuring User Privilege Level Under a User Interface······························································································6
Configuring Access Restriction on VTY User Interfaces·································································································7
Configuring Supported Protocols on VTY User Interfaces·····························································································8
Configuring Authentication Mode···································································································································8
Configuring Command Authorization ························································································································· 10
Configuring Command Accounting ····························································································································· 11
Defining Shortcut Keys for Starting Terminal Sessions/Aborting Tasks ··································································· 12
Sending Messages to the Specified User Interfaces··································································································· 12
Releasing the Connection Established on the User Interfaces ··················································································· 12
Displaying and Maintaining User Interfaces··············································································································· 13
User Interface Configuration Examples ······················································································································· 13
User Authentication Configuration Example ······································································································ 13
Command Authorization Configuration Example······························································································ 15
Command Accounting Configuration Example·································································································· 16