beautypg.com
ii
Introduction ···························································································································································· 32
Telnet login authentication modes ······················································································································· 33
Configuring none authentication for telnet login ······························································································· 33
Configuring password authentication for telnet login ······················································································· 34
Configuring scheme authentication for telnet login ··························································································· 36
Configuring common settings for VTY user interfaces (optional) ······································································ 38
Configuring the SecBlade card to log in to a telnet server as a telnet client ·················································· 39
Displaying and maintaining CLI login ························································································································· 40
Logging in to the SecBlade NS card from the host device ····················································································· 42
Logging in to the SecBlade NS card from the host device ························································································ 42
Resetting the system of the SecBlade NS card ············································································································ 42
Configuring the ACSEI Protocol ··································································································································· 43
ACSEI timers ·························································································································································· 43
ACSEI startup and running ··································································································································· 43
Configuring ACSEI server on the host device ············································································································· 44
Configuring ACSEI client on the NetStream card ······································································································ 44
Displaying and maintaining ACSEI server and ACSEI client ··········································································· 44
NMS login ·································································································································································· 46
NMS login overview ······················································································································································ 46
Configuring NMS login ················································································································································· 46
NMS login example······················································································································································· 48
User login control ······················································································································································· 50
User login control overview ·········································································································································· 50
Configuring login control over telnet users ·················································································································· 50
Configuration preparation ···································································································································· 50
Configuring source IP-based login control over telnet users ············································································· 50
Configuring source and destination IP-based login control over telnet users ················································· 51
Configuring source MAC-based login control over telnet users ······································································· 51
Source MAC-based login control configuration example ················································································· 52
Configuring source IP-based login control over NMS users ······················································································ 53
Configuration preparation ···································································································································· 53
Configuring source IP-based login control over NMS users ············································································· 53
Source IP-based login control over NMS users configuration example ·························································· 54
Interface configuration ··············································································································································· 55
Ethernet interface overview ··········································································································································· 55
General configuration ··················································································································································· 56
Configuring a combo interface ···························································································································· 56
Configuring basic settings of an Ethernet interface or subinterface ································································ 57
Shutting down an Ethernet interface or subinterface ························································································· 58
Configuring flow control on an Ethernet interface ····························································································· 58
Configuring loopback testing on an Ethernet interface ····················································································· 59
Configuring the link mode of an Ethernet interface ··························································································· 59
Configuring a Layer 2 Ethernet interface or subinterface ·························································································· 60
Layer 2 Ethernet interface or subinterface configuration task list ····································································· 60
Configuring storm suppression ···························································································································· 60
Setting the MDI mode of an Ethernet interface ·································································································· 61
Configuring a Layer 3 Ethernet interface or subinterface ·························································································· 61
Layer 3 Ethernet interface or subinterface configuration task list ····································································· 61
Setting the MTU for an Ethernet interface or subinterface ················································································ 62
Configuring an Ethernet interface to operate in promiscuous mode ······························································· 62
Displaying and maintaining an Ethernet interface or subinterface ··········································································· 63
Configuring a loopback interface ································································································································ 63