beautypg.com

H3C Technologies H3C SecBlade NetStream Cards User Manual

Page 7

background image

ii

Introduction ···························································································································································· 32

 

Telnet login authentication modes ······················································································································· 33

 

Configuring none authentication for telnet login ······························································································· 33

 

Configuring password authentication for telnet login ······················································································· 34

 

Configuring scheme authentication for telnet login ··························································································· 36

 

Configuring common settings for VTY user interfaces (optional) ······································································ 38

 

Configuring the SecBlade card to log in to a telnet server as a telnet client ·················································· 39

 

Displaying and maintaining CLI login ························································································································· 40

 

Logging in to the SecBlade NS card from the host device ····················································································· 42

 

Logging in to the SecBlade NS card from the host device ························································································ 42

 

Resetting the system of the SecBlade NS card ············································································································ 42

 

Configuring the ACSEI Protocol ··································································································································· 43

 

ACSEI timers ·························································································································································· 43

 

ACSEI startup and running ··································································································································· 43

 

Configuring ACSEI server on the host device ············································································································· 44

 

Configuring ACSEI client on the NetStream card ······································································································ 44

 

Displaying and maintaining ACSEI server and ACSEI client ··········································································· 44

 

NMS login ·································································································································································· 46

 

NMS login overview ······················································································································································ 46

 

Configuring NMS login ················································································································································· 46

 

NMS login example······················································································································································· 48

 

User login control ······················································································································································· 50

 

User login control overview ·········································································································································· 50

 

Configuring login control over telnet users ·················································································································· 50

 

Configuration preparation ···································································································································· 50

 

Configuring source IP-based login control over telnet users ············································································· 50

 

Configuring source and destination IP-based login control over telnet users ················································· 51

 

Configuring source MAC-based login control over telnet users ······································································· 51

 

Source MAC-based login control configuration example ················································································· 52

 

Configuring source IP-based login control over NMS users ······················································································ 53

 

Configuration preparation ···································································································································· 53

 

Configuring source IP-based login control over NMS users ············································································· 53

 

Source IP-based login control over NMS users configuration example ·························································· 54

 

Interface configuration ··············································································································································· 55

 

Ethernet interface overview ··········································································································································· 55

 

General configuration ··················································································································································· 56

 

Configuring a combo interface ···························································································································· 56

 

Configuring basic settings of an Ethernet interface or subinterface ································································ 57

 

Shutting down an Ethernet interface or subinterface ························································································· 58

 

Configuring flow control on an Ethernet interface ····························································································· 58

 

Configuring loopback testing on an Ethernet interface ····················································································· 59

 

Configuring the link mode of an Ethernet interface ··························································································· 59

 

Configuring a Layer 2 Ethernet interface or subinterface ·························································································· 60

 

Layer 2 Ethernet interface or subinterface configuration task list ····································································· 60

 

Configuring storm suppression ···························································································································· 60

 

Setting the MDI mode of an Ethernet interface ·································································································· 61

 

Configuring a Layer 3 Ethernet interface or subinterface ·························································································· 61

 

Layer 3 Ethernet interface or subinterface configuration task list ····································································· 61

 

Setting the MTU for an Ethernet interface or subinterface ················································································ 62

 

Configuring an Ethernet interface to operate in promiscuous mode ······························································· 62

 

Displaying and maintaining an Ethernet interface or subinterface ··········································································· 63

 

Configuring a loopback interface ································································································································ 63