Logging in through SNMP from an NMS 22 Overview 22 Configuring SNMP agent 22 NMS login example 24

Size: px
Start display at page:

Download "Logging in through SNMP from an NMS 22 Overview 22 Configuring SNMP agent 22 NMS login example 24"

Transcription

1 Contents Logging in to the CLI 1 Login methods 1 Logging in through the console or AUX port 2 Introduction 2 Configuration procedure 2 Logging in through Telnet 6 Introduction 6 Logging in to the switch from a Telnet client 6 Telnetting from the switch to another device 8 Logging in through SSH 9 Introduction 9 Logging in to the switch from an SSH client 10 Configuring the SSH client to log in to the SSH server 12 Logging in through the AUX port by using modems 13 Introduction 13 Configurations on the administrator side 13 Configurations on the switch 14 Setting up a configuration environment 14 Logging in to the web interface 17 Overview 17 Configuring HTTP login 17 Configuring source IP-based login control over web users 18 Configuration preparation 18 Configuring source IP-based login control over web users 18 Logging off online web users 19 Source IP-based login control over web users configuration example 19 Displaying and maintaining web login 20 Web login example 20 Logging in through SNMP from an NMS 22 Overview 22 Configuring SNMP agent 22 NMS login example 24 Logging in through CWMP from an ACS 25 Configuring user interfaces 26 Overview 26 Users and user interfaces 26 Numbering user interfaces 27 User interface configuration task list 27 Configuring user interface attributes 28 Configuring asynchronous serial interface attributes 28 Configuring common settings for user interfaces 29 Configuring a command to be automatically executed 30 Configuring user privilege level under a user interface 30 Configuring access control on VTY user interfaces 31 Configuring supported protocols on VTY user interfaces 31 Configuring authentication mode 32 Configuring command authorization 34 1

2 Configuring command accounting 35 Defining shortcut keys for starting terminal sessions/aborting tasks 35 Sending messages to the specified user interfaces 36 Releasing the connection established on the user interfaces 36 Displaying and maintaining user interfaces 36 User interface configuration examples 37 User authentication configuration example 37 Command authorization configuration example 39 Command accounting configuration example 40 Configuring login control over Telnet users 42 Configuration preparation 42 Configuring source IP-based login control over Telnet users 42 Configuring source and destination IP-based login control over Telnet users 42 Configuring source MAC-based login control over Telnet users 43 Source MAC-based login control configuration example 44 2

3 Logging in to the CLI Login methods You can enter the command-line interface (CLI) of your switch in a variety of ways. Table 1 Login methods Login method Logging in through the console or AUX port Logging in through Telnet Logging in through SSH Logging in through the AUX port by using modems Default settings By default, you can log in to your switch through the console or AUX port, the authentication mode is None (no username or password required), and the user privilege level is 3. By default, you cannot log in to your switch through Telnet. To do so, log in to your switch through the console port, and complete the following configurations: Enable the Telnet server function of your switch. By default, the Telnet server function is disabled. Configure the IP address of the network management port or VLAN interface of your switch, and make sure that your switch and the Telnet client can reach each other (by default, your switch does not have an IP address.). Configure the authentication mode of VTY login users (password by default). Configure the user privilege level of VTY login users (0 by default). By default, you cannot log in to your switch through SSH. To do so, log in to your switch through the console port, and complete the following configurations: Enable the SSH server function of your switch. By default, the SSH server function is disabled. Configure the IP address of the network management port or VLAN interface of your switch, and make sure that your switch and the SSH client can reach each other (by default, your switch does not have an IP address.). Configure the authentication mode of VTY login users as scheme (password by default). Configure the user privilege level of VTY login users (0 by default). By default, you cannot log in to your switch by using modem dial-in through the AUX port. To do so, log in to your switch through the console port, and complete the following configurations: Configure the authentication mode of AUX login users (password by default). Configure the user privilege level of AUX login users (0 by default). 1

4 Logging in through the console or AUX port Introduction NOTE: The AUX port can be used as the backup of the console port. Using the AUX port for local login is the same as using the console port. The following uses the console port login as an example to describe the configuration and login procedure. Logging in through the console port is the most common way to log in to a switch. It is also the prerequisite to configure other login methods. By default, you can log in to the switch through its console port only. To log in to the switch through its console port, the related configuration of the user terminal must be in accordance with that of the console port. Table 2 Default settings of the console port Setting Baud rate Flow control Check mode Default 9600 bps Off No check bit Stop bits 1 Data bits 8 Configuration procedure 1. As shown in Figure 1, use a console cable to connect the serial port of your PC (or terminal) to the console port of your switch. 2

5 Figure 1 Setting up a configuration environment 2. Connect the DB-9 connector of the console cable to the serial port of a PC or terminal. 3. Connect the RJ-45 connector of the console cable to the console port of the main board of the switch. NOTE: If two main boards are installed on the switch, log in through the console port on the active main board (AMB) (typically with a smaller slot number) for the first login. When you remove the console cable, first unplug the RJ-45 end, and then the DB-9 end. 4. Launch a terminal emulation utility (such as HyperTerminal in Windows XP/Windows 2000), select a serial port to be connected to the switch, and set terminal parameters as follows: set Bits per second to 9600, Data bits to 8, Parity to None, Stop bits to 1, and Flow control to None, as shown in Figure 2 through Figure 4. NOTE: If you use the Windows 2003 Server operating system on your PC, add a HyperTerminal, and then log in to and manage the switch as described in this document. If you use Windows 2008 Server, Windows 7, Windows Vista, or any other operating system on your PC, use the third party terminal software. For how to use the third party terminal software, see the user guide or online help of that software. 3

6 Figure 2 Connection description Figure 3 Specifying the serial port used to establish the connection 4

7 Figure 4 Setting the properties of the serial port 5. Turn on the switch. Press Enter if the switch successfully completes the power-on self test (POST). The following prompt appears when you press Enter: <Sysname> 6. Execute commands to configure the switch or check the running status of the switch. To get help, enter?. After the steps above, you can enter the CLI to configure and manage your switch. By default, users that log in through the console port are not authenticated. For security, you are recommended to change the authentication mode of the console port. The following describes how to configure password authentication. <Sysname> system-view [Sysname] user-interface console 0 [Sysname-ui-console0] authentication-mode password [Sysname-ui-console0] set authentication password cipher 123 After the configuration above, when users log in through the console port, they must enter authentication password 123 to pass authentication and then log in to the switch. NOTE: You can set the authentication mode of console login users to none or scheme (username and password authentication). For more information about authentication modes, see Configuring authentication mode. After you log in through the console port, you can also set login parameters other than the authentication mode. For more information, see Configuring user interface attributes. 5

8 Logging in through Telnet Introduction You can remotely manage and maintain your switch through Telnet. To log in to your switch through Telnet, perform necessary configurations on both your switch and the Telnet client. Table 3 Telnet login requirements Device Telnet server Telnet client Requirement Configure the IP address of the Telnet server. Make sure that the Telnet server and client can reach each other. Enable the Telnet server. Configure the authentication mode for Telnet login. Run the Telnet program Obtain the IP address of the Telnet server to log in. The switch can either operate as a Telnet server or client. As a Telnet server By default, the switch is disabled with the Telnet server function, and password authentication is adopted for Telnet login, but no login password is configured. Therefore, you cannot log in to the switch through Telnet by default. To log in to the switch through Telnet, perform the following configuration first: a. Log in to your switch through the console port, and configure the IP address of the network management interface or VLAN interface of the switch. b. Enable the Telnet server function with the telnet server enable command. c. Specify an authentication mode for Telnet login. d. Configure user privilege level and common settings (optional). For more information, see Configuring common settings for user interfaces. As a Telnet client By default, the switch is enabled with the Telnet client function, and you can log in to a Telnet server from the switch to perform operations on the server. Logging in to the switch from a Telnet client NOTE: This section uses a PC as the Telnet client. 1. Log in to the switch through the console port, and configure the IP address of the network management port of the switch. For more information about how to log in to the switch through the console port, see Logging in through the console or AUX port. 6

9 IMPORTANT: You can Telnet to your switch through the network management port or any other Layer 3 interface (for example, Layer 3 Ethernet interfaces and VLAN interfaces). # Configure the IP address of the network management port as /24. <Sysname> system-view [Sysname] interface M-Ethernet 0/0/0 [Sysname-M-Ethernet0/0/0] ip address Enable the Telnet server function of the switch. 1. Enter system view. system-view N/A 2. Enable the Telnet server. telnet server enable Disabled by default. 3. Enter VTY user interface view, and configure the authentication mode as needed. For more information, see Configuring authentication mode. 4. Configure the user privilege level. Users that telnet to the switch can only execute level 0 commands by default. For more information about command levels, see Configuring user privilege level under a user interface. 5. Set up a configuration environment as shown in Figure 5: Connect the Ethernet port of your PC to the network management port of your switch, and make sure that the PC and switch can reach each other. Figure 5 Setting up a configuration environment 6. Telnet to the IP address of the management port of the switch, as shown in Figure 6. 7

10 Figure 6 Running the Telnet program 7. If the authentication mode is none, you can log in to the switch without any authentication. If the authentication mode is password, the terminal prompts you to enter the login password. If the authentication mode is scheme, you must enter the username and password to log in to the switch. After you enter the correct username and password, if the switch prompts you to enter another password of the specified type, you will be authenticated for the second time. In other words, to pass authentication, you must enter a correct password as prompted. 8. Execute commands to configure the switch, or check the running status of the switch. To get help, enter?. NOTE: When configuring your switch through Telnet, do not delete or change the IP address of the network management port or VLAN interface corresponding to the Telnet connection. Otherwise, the Telnet connection will be terminated. All user interfaces are used, please try later! means the number of concurrent Telnet login users exceed the upper limit. Please try later. Telnetting from the switch to another device To telnet to another device from the local switch, follow these steps: 1. Set up a configuration environment as shown in Figure 7. Figure 7 Telnetting from the switch (Telnet client) to another device (Telnet server) NOTE: If the two switches are not in the same LAN, make sure that the two switches can reach each other. 2. Configure the Telnet server. a. Enable the Telnet server. b. Configure the authentication mode on the Telnet server as needed. 3. Log in to the switch that operates as the Telnet client. 4. Execute the telnet command on the Telnet client to log in to the Telnet server: 8

11 1. Enter system view. system-view N/A 2. Specify the source IPv4 address or source interface for sending Telnet packets when the switch serves as a Telnet client. telnet client source { interface interface-type interface-number ip ip-address } By default, no source IPv4 address or source interface for sending Telnet packets is specified. The source IPv4 address is selected by routing. 3. Exit to user view. quit N/A 4. Telnet to the Telnet server. telnet remote-host [ service-port ] [ [ vpn-instance vpn-instance-name ] [ source { interface interface-type interface-number ip ip-address } ] ] telnet ipv6 remote-host [ -i interface-type interface-number ] [ port-number ] [ vpn-instance vpn-instance-name ] Use either approach. Available in user view. 5. After login, a prompt appears (for example, <Sysname> ). If All user interfaces are used, please try later! appears, try again later. 6. Execute commands to configure the switch, or check the running status of the switch. To get help, enter?. Logging in through SSH Introduction Secure Shell (SSH) offers an approach to log in to a remote device securely. By providing encryption and strong authentication, it protects devices against attacks such as IP spoofing and plain text password interception. The switch supports SSH, and you can log in to the switch through SSH to remotely manage and maintain the switch, as shown in Figure 8. Figure 8 SSH login diagram The following table shows the configuration requirements of SSH login: Object SSH server Requirements Configure the IP address of the SSH server, and make sure the SSH server and client can reach each other. Configure the authentication mode and other settings. 9

12 Object SSH client Requirements If the host operates as an SSH client, run the SSH client program on the host. Obtain the IP address of the SSH server. The switch can operate as either an SSH server or client. As an SSH server: You can perform configurations on the SSH server to control SSH client login. By default, the switch is disabled with the SSH server function. Therefore, before you can log in to the switch through SSH, you need to log in to the switch through the console port and configure the authentication mode, user level, and common settings. As an SSH client: You can log in to an SSH sever from the client to perform operations on the server. By default, the switch is enabled with the SSH client function. Logging in to the switch from an SSH client Configuration prerequisites Log in to the switch through the console port. For more information, see Logging in through the console or AUX port. Configuration procedure To configure the switch that serves as an SSH server: 1. Enter system view. system-view N/A 2. Create local key pair(s). public-key local create { dsa rsa } By default, no local key pair(s) are created. 3. Enable SSH server. ssh server enable By default, SSH server is disabled. 4. Exit to system view. quit N/A 5. Enter one or more VTY user interface views. 6. Specify the scheme authentication mode. 7. Enable the current user interface to support either Telnet, SSH, or both of them. user-interface vty first-number [ last-number ] authentication-mode scheme protocol inbound { all ssh } N/A By default, authentication mode for VTY user interfaces is password. By default, both protocols are supported. 8. Exit to system view. quit N/A 10

13 9. Configure the authentication mode. 10. Create a local user and enter local user view. 11. Set the local password. 12. Specify the command level of the local user. 13. Specify the service type for the local user. 1. Enter the default ISP domain view: domain domain-name 2. Apply the specified AAA scheme to the domain: authentication default { hwtacacs-scheme hwtacacs-scheme-name [ local ] local none radius-scheme radius-scheme-name [ local ] } 3. Exit to system view: quit local-user user-name password { cipher simple } password authorization-attribute level level service-type ssh By default, the AAA scheme is local. If you specify the local AAA scheme, perform the configuration concerning local user as well. If you specify an existing scheme by providing the radius-scheme-name argument, perform the following configuration as well: For RADIUS and HWTACACS configuration, see Security Configuration Guide. Configure the username and password on the AAA server. (For more information, see Security Configuration Guide.) By default, no local user exists. By default, no local password is set. By default, the command level is 0. By default, no service type is specified. 14. Return to system view. quit N/A 15. Create an SSH user, and specify the authentication mode for the SSH user. 16. Configure common settings for VTY user interfaces. ssh user username service-type stelnet authentication-type { password { any password-publickey publickey } assign publickey keyname } N/A By default, no SSH user exists, and no authentication mode is specified. See Configuring common settings for user interfaces. NOTE: This chapter describes how to configure an SSH client by using password authentication. For more information about SSH and how to configure an SSH client by using publickey, see Security Configuration Guide. After you enable command authorization or command accounting, you need to perform the following configuration to make the function take effect: Create an HWTACACS scheme, and specify the IP address of the authorization server and other authorization parameters. Reference the created HWTACACS scheme in the ISP domain. For more information, see Security Configuration Guide. 11

14 When users adopt the scheme mode to log in to the switch, the level of the commands that the users can access depends on the user privilege level defined in the AAA scheme: When the AAA scheme is local, the user privilege level is defined by the authorization-attribute level level command. When the AAA scheme is RADIUS or HWTACACS, the user privilege level is configured on the RADIUS or HWTACACS server. For more information about AAA, RADIUS, and HWTACACS, see Security Configuration Guide. Configuring the SSH client to log in to the SSH server Configuration prerequisites Log in to the switch through the console port. For more information, see Logging in through the console or AUX port. Figure 9 Logging in to another device from the current device NOTE: If the Telnet client and the Telnet server are not in the same subnet, make sure that the two devices can reach each other. Configuration procedure To configure the SSH client to log in to the SSH server: Task Command Remarks Log in to an IPv4 SSH server. ssh2 server [ port-number ] [ vpn-instance vpn-instance-name ] [ identity-key { dsa rsa } prefer-ctos-cipher { 3des aes128 des } prefer-ctos-hmac { md5 md5-96 sha1 sha1-96 } prefer-kex { dh-group-exchange dh-group1 dh-group14 } prefer-stoc-cipher { 3des aes128 des } prefer-stoc-hmac { md5 md5-96 sha1 sha1-96 } ] * server is the IPv4 address or host name of the server. Available in user view. 12

15 Task Command Remarks Log in to an IPv6 SSH server. ssh2 ipv6 server [ port-number ] [ vpn-instance vpn-instance-name ] [ identity-key { dsa rsa } prefer-ctos-cipher { 3des aes128 des } prefer-ctos-hmac { md5 md5-96 sha1 sha1-96 } prefer-kex { dh-group-exchange dh-group1 dh-group14 } prefer-stoc-cipher { 3des aes128 des } prefer-stoc-hmac { md5 md5-96 sha1 sha1-96 } ] * server is the IPv6 address or host name of the server. Available in user view. NOTE: You can configure other settings for the switch (SSH client) to work with the SSH server. For more information, see Security Configuration Guide. Logging in through the AUX port by using modems Introduction An administrator can use two modems and the Public Switched Telephone Network (PSTN) to remotely maintain a remote switch through its AUX port. When the network connection is broken, you can use this method to remotely configure a switch, query logs and alarms, and locate faults over the PSTN. To use this method, perform necessary configurations at both the switch side and administrator side. Table 4 Requirements of remote login through AUX port by using modem dial-in Device Requirement Administrator side The PC is correctly connected to the modem. The modem is connected to a telephone cable that works normally. The telephone number of the remote modem connected to the AUX port of the remote switch is obtained. Switch side The AUX port is correctly connected to the modem. Configurations have been configured on the modem. The modem is connected to a telephone cable that works normally. Authentication configuration has been completed on the remote switch. For more information, see Configuring authentication mode. Configurations on the administrator side The PC and the modem are correctly connected, the modem is connected to a telephone cable that works normally, and the telephone number of the remote modem connected to the AUX port of the remote switch is obtained. 13

16 Configurations on the switch Configuration on the modem that is directly connected to the switch Perform the following configurations on the modem that is directly connected to the switch (no configuration is needed on the modem connected to the terminal): AT&F Restore the factory defaults ATS0= Configure auto-answer on first ring AT&D Ignore data Terminal Ready signals AT&K Disable local flow control AT&R Ignore Data Flow Control signals AT&S Force DSR to remain on ATEQ1&W Disable the modem from response to commands and save the configuration To verify your configuration, enter AT&V to show the configuration results. NOTE: The configuration commands and the output for different modems may be different. For more information, see the user guide of your modem. Configuration on the switch When configuring the switch, note the following guidelines: The transmission speed on the AUX port must be lower than that of the modem. Otherwise, packets may be lost. Other attributes (parity check, stop bits, and data bits) of the AUX port adopt the default values. Setting up a configuration environment 1. Perform the following configurations on the modem that is directly connected to your switch: AT&F Restore the factory defaults ATS0= Configure auto-answer on first ring AT&D Ignore data Terminal Ready signals AT&K Disable local flow control AT&R Ignore Data Flow Control signals AT&S Force DSR to remain on ATEQ1&W Disable the modem from response to commands and save the configuration To verify your configuration, execute the AT&V command to display the configuration results. 2. Set up a configuration environment as shown in Figure 10: connect the serial port of the PC and the AUX port of the switch to a modem respectively. 14

17 Figure 10 Setting up a configuration environment Modem serial cable Telephone cable Modem IP network Remote telephone number: Dial the destination number (the number of the modem that is connected to the switch) on the PC to establish a connection with the switch, as shown in Figure 11 through Figure 13. Figure 11 Connection Description 15

18 Figure 12 Entering the phone number Figure 13 Dialing the number 4. If the authentication mode is password, a prompt (for example, Sysname) appears after you enter the configured password. Then you can configure or manage the switch. To get help, enter?. 16

19 Logging in to the web interface Overview The switch provides a built-in web server. It enables you to log in to the web interface of the switch from a PC. Web login is disabled by default. To enable web login, log in to the switch via the console port, and perform the following configuration: Enable HTTP service Configure the IP address of the VLAN interface Configure a username and password The switch supports logging in to the web interface through the Hypertext Transfer Protocol (HTTP). HTTP is used for transferring web page information across the Internet. It is an application-layer protocol in the TCP/IP protocol suite. The connection-oriented Transport Control Protocol (TCP) is adopted at the transport layer. Currently, the switch supports HTTP 1.0. The following table shows the configuration requirements of web login: Object Requirements Device Configuring the IP address of the VLAN interface. Making sure the switch and the PC can reach each other.configuring HTTP login PC Installing a web browser. Obtaining the IP address of the VLAN interface of the switch. Configuring HTTP login To configure HTTP login: 1. Specify a fixed verification code for web login. web captcha verification-code By default, a web user must enter the verification code indicated on the login page to log in. This command is available in user view. 2. Enter system view. system-view N/A 3. Enable the HTTP service. ip http enable Enabled by default. 17

20 4. Configure the HTTP service port number. 5. Associate the HTTP service with an ACL. 6. Create a local user and enter local user view. 7. Configure a password for the local user. 8. Specify the command level of the local user. 9. Specify the Telnet service type for the local user. ip http port port-number ip http acl acl-number local-user user-name password { cipher simple } password authorization-attribute level level service-type web 80 by default. If you execute the command multiple times, the last one takes effect. By default, the HTTP service is not associated with any ACL. Associating the HTTP service with an ACL enables the switch to allow only clients permitted by the ACL to access the switch. By default, no local user is configured. By default, no password is configured for the local user. No command level is configured for the local user. By default, no service type is configured for the local user. 10. Exit to system view. quit N/A 11. Create a VLAN interface and enter its view. 12. Assign an IP address and subnet mask to the VLAN interface. interface vlan-interface-id vlan-interface ip address ip-address { mask mask-length } If the VLAN interface already exists, the command enters its view. By default, no IP address is assigned to the VLAN interface. Configuring source IP-based login control over web users You can log in to the web management page of the switch through HTTP to remotely manage the switch. By using the ACL, you can control web user access to the switch. Configuration preparation Before configuration, determine the permitted or denied source IP addresses. Configuring source IP-based login control over web users Basic ACLs match the source IP addresses of packets, so you can use basic ACLs to implement source IP-based login control over web users. Basic ACLs are numbered from 2000 to For more information about ACL, see ACL and QoS Configuration Guide. To configure source IP-based login control over web users: 18

21 1. Enter system view. system-view N/A 2. Create a basic ACL and enter its view, or enter the view of an existing basic ACL. 3. Create rules for this ACL. acl [ ipv6 ] number acl-number [ match-order { config auto } ] rule [ rule-id ] { permit deny } [ source { sour-addr sour-wildcard any } time-range time-name fragment logging ]* By default, no basic ACL exists. N/A 4. Exit the basic ACL view. quit N/A 5. Associate the HTTP service with the ACL. ip http acl acl-number N/A Logging off online web users To log off online web users: Task Command Remarks Log off online web users. free web-users { all user-id user-id user-name user-name } Available in user interface view Source IP-based login control over web users configuration example Network requirements As shown in Figure 14, configure the switch to allow only web users from Host B to access. Figure 14 Network diagram Configuration procedure # Create ACL 2000, and configure rule 1 to permit packets sourced from Host B. <Sysname> system-view [Sysname] acl number 2030 match-order config 19

22 [Sysname-acl-basic-2030] rule 1 permit source # Associate the ACL with the HTTP service so that only web users from Host B are allowed to access the switch. [Sysname] ip http acl 2030 Displaying and maintaining web login Task Command Remarks Display information about web users. Display HTTP state information. display web users [ { begin exclude include } regular-expression ] display ip http [ { begin exclude include } regular-expression ] Available in any view Available in any view Web login example Network requirements As shown in Figure 15, configure the switch to allow the PC to log in over the IP network. Figure 15 Network diagram Configuration procedure 1. Configure the switch # Create VLAN 999 and add interface GigabitEthernet 3/0/1 that connects the switch to the PC to the VLAN. <Sysname> system-view [Sysname] vlan 999 [Sysname-vlan999] port GigabitEthernet 3/0/1 [Sysname-vlan999] quit # Specify the IP address and subnet mask of VLAN-interface 999 as and [Sysname] interface vlan-interface 999 [Sysname-VLAN-interface999] ip address [Sysname-VLAN-interface999] quit # Create a local user named admin, and set the password to admin for the user. Specify the Telnet service type for the local user, and set the command level to 3 for this user. [Sysname] local-user admin [Sysname-luser-admin] service-type web [Sysname-luser-admin] authorization-attribute level 3 [Sysname-luser-admin] password simple admin 2. Verify the configuration 20

23 # On the PC, run the web browser. Enter the IP address of the switch in the address bar. The web login page appears, as shown in Figure 16. Figure 16 Web login page # Enter the user name, password, verify code, select English, and click Login. The homepage appears. After login, you can configure switch settings through the web interface. 21

24 Logging in through SNMP from an NMS Overview A network management system (NMS) runs the SNMP client software. It offers a user-friendly interface to facilitate network management. An agent is a program that resides in the switch. It receives and handles requests from the NMS. An NMS is a manager in an SNMP enabled network, whereas agents are managed by the NMS. The NMS and agents exchange information through the SNMP protocol. The switch supports multiple NMS programs, such as imc. By default, you cannot log in to the switch through NMS. To enable NMS login, log in to the switch through the console port and make the configurations described in the following table. The following table shows the requirements for NMS login: Object Switch NMS Requirements Assign an IP address to a Layer 3 interface. Make sure the switch and the NMS can reach each other.configure SNMP settings. Configure the NMS. For more information, see the manual of your NMS. NOTE: The switch supports connecting to a NMS through the network management interface, a VLAN interface, a Layer 3 Ethernet interface, or a Layer 3 Ethernet subinterface. Configuring SNMP agent Before configuring SNMP on the switch, connect the Ethernet port of the NMS host to an Ethernet port of VLAN 1 on the switch, and make sure that the NMS host and VLAN 1 interface can reach each other. Figure 17 Network diagram NOTE: The switch supports three SNMP versions: SNMPv1, SNMPv2c, and SNMPv3. For more information about SNMP, see Network Management and Monitoring Configuration Guide. To configure SNMPv3 agent: 1. Enter system view. system-view N/A 22

25 2. Enable SNMP agent. snmp-agent Disabled by default. You can enable SNMP agent with this command or any command that begins with snmp-agent. 3. Configure an SNMP group and specify its access right. 4. Add a user to the SNMP group. snmp-agent group v3 group-name [ authentication privacy ] [ read-view read-view ] [ write-view write-view ] [ notify-view notify-view ] [ acl acl-number ] snmp-agent usm-user v3 user-name group-name [ [ cipher ] authentication-mode { md5 sha } auth-password [ privacy-mode { 3des aes128 des56 } priv-password ] ] [ acl acl-number ] By default, no SNMP group is configured. If the cipher keyword is specified, both auth-password and priv-password are cipher text passwords. To configure SNMPv1 or SNMPv2c agent: 1. Enter system view. system-view N/A Disabled by default. 2. Enable SNMP agent. snmp-agent You can enable SNMP agent with this command or any command that begins with snmp-agent. 3. Create or update MIB view information. 4. Specify the SNMP NMS access right. snmp-agent mib-view { excluded included } view-name oid-tree [ mask mask-value ] (Approach 1) Specify the SNMP NMS access right directly by configuring an SNMP community snmp-agent community { read write } community-name [ acl acl-number mib-view view-name ]* (Approach 2) Specify the SNMP NMS access right indirectly a. Configure an SNMP group snmp-agent group { v1 v2c } group-name [ read-view read-view ] [ write-view write-view ] [ notify-view notify-view ] [ acl acl-number ] b. Add a user to the SNMP group snmp-agent usm-user { v1 v2c } user-name group-name [ acl acl-number ] By default, the MIB view name is ViewDefault and OID is 1. Use either approach. The direct configuration approach is for SNMPv1 or SNMPv2c. The community name configured on the NMS should be consistent with the username configured on the agent. The indirect configuration approach is for SNMPv3. 23

26 NMS login example In this example, imc is used as the NMS for illustration. 1. Configure the switch # Assign IP address /24 to VLAN-interface 1. Make sure the switch and the NMS host can reach each other. (Details not shown) # Enter system view. <Sysname> system-view # Enable the SNMP agent. [Sysname] snmp-agent # Create an SNMP community and assign access rights. [Sysname] snmp-agent sys-info version all [Sysname] snmp-agent community read public [Sysname] snmp-agent community write private # Configure an SNMP group. [Sysname] snmp-agent group v3 managev3group # Add a user to the SNMP group. [Sysname] snmp-agent usm-user v3 managev3user managev3group 2. Configure the imc system a. On the PC, launch a browser, and enter in the address bar (suppose that the IP address of the imc is ). b. On the login page, enter the username and password, and then click Login. The imc homepage appears. c. Configure the switch in the imc system. (Details not shown) For more information about imc, see the manuals for imc. NOTE: The settings of the switch in the imc system must match those of the switch. For more information about NMS and SNMP agent configuration on the imc and switch, see Network Management and Monitoring Configuration Guide. When you log in to the imc system for the first time, you can use the default account with the username admin and password admin. Be sure to change the password immediately after login. For how to change the password, see the manuals for imc, such as H3C Intelligent Management Center Getting Started Guide. You can also add accounts with different rights for operators and perform other operations in the imc system. For more information, see the online help of imc. 24

27 Logging in through CWMP from an ACS You can launch a browser on a PC to log in to an auto-configuration server (ACS), and use the server to access and manage customer premises equipment (CPE) through the CPE WAN Management Protocol (CWMP). CWMP is intended for management and configuration of home network devices in DSL access networks. The H3C implementation of the ACS system is the imc branch intelligent management system (BIMS) component, which runs on the imc platform. To log in to an ACS running BIMS from a PC, follow these steps: 1. Launch a browser on the PC. 2. Enter :8080/imc in the address bar (suppose that the ACS uses the IP address and the port 8080). 3. Enter the login username and password, which are the same as those used for logging in to imc. NOTE: When you log in to the imc system for the first time, you can use the default account with the username admin and password admin. Be sure to change the password immediately after login. For how to change the password, see the manuals for imc, such as H3C Intelligent Management Center Getting Started Guide. You can also add accounts with different rights for operators and perform other operations in the imc system. For more information, see the online help of imc. For more information about ACS, see Network Management and Monitoring Configuration Guide. For more information about imc BIMS, see the manuals for imc BIMS. 25

28 Configuring user interfaces Overview A user interface (also called a line) allows you to manage and monitor sessions between the terminal and switch when you are using the console port, AUX port, and asynchronous serial interfaces to log in to the switch by Telnet or SSH. Asynchronous serial interfaces include the following two types: Synchronous/asynchronous serial interface operating in asynchronous mode, whose interface index begins with Serial. Dedicated asynchronous serial interface, whose interface index begins with Async. One user interface corresponds to one user interface view where you can configure a set of parameters, such as whether to authenticate users at login, whether to redirect the requests to another device, and the user level after login. When the user logs in through a user interface, the connection follows these parameter settings, thus implementing centralized management of various sessions. At present, the system supports the following CLI configuration modes: Local configuration via the console port Local/Remote configuration via the AUX port (Auxiliary port) Local/Remote configuration via the asynchronous serial port Local/Remote configuration through Telnet or SSH The four modes correspond to three types of user interfaces. They are: Console user interface Manages and monitors users that log in via the console port. Console port is a line device port. The switch provides console ports of EIA/TIA-232 DCE type. AUX user interface Manages and monitors users that log in via the AUX port. AUX port is also a line device port. The switch provides AUX ports of EIA/TIA-232 DTE type. The port is usually used for dialup access via modem. VTY (virtual type terminal) user interface Manages and monitors users logging in via VTY. VTY port is a logical terminal line used when you access the switch through Telnet or SSH. At present, the switch supports at most 16 concurrent VTY users. Users and user interfaces At a time, only one user can use the user interface. The user interface configuration applies to any user that has logged in. For example, if user A uses the console port to log in, the configuration in user interface view of the console port applies to user A; if user A logs in through VTY 1, the configuration in user interface view of VTY 1 applies. The switch can support multiple console ports, AUX ports, and thus multiple user interfaces are supported. These user interfaces do not associate with specific users. When the user initiates a connection request, based on the login type the system automatically assigns a type of idle user interface with the smallest number to the user. During the login, the configuration in the user interface view takes effect. The user interface varies depending on the login type and the login time. 26

29 Numbering user interfaces User interfaces can be numbered in two ways: absolute numbering and relative numbering. Absolute numbering Absolute numbering allows you to uniquely specify a user interface or a group of user interfaces. The stand alone mode has a different absolute numbering mechanism from the IRF mode. Standalone mode The numbering approach numbers the four types of user interfaces in the sequence of console, AUX, and VTY. The numbering system starts from number 0 with a step of 1. The console port and AUX port each use two numbers, and the VTY user interface uses numbers 20 through 35. To view all user interfaces currently supported and their absolute number, use the display user-interface command without any parameters. IRF mode Relative numbering The numbering approach numbers the four types of user interfaces in the sequence of console, AUX, and VTY. The numbering system starts from number 0 with a step of 1. The user interfaces of the master are numbered the first, and then the slave. The console port and AUX port each use four numbers, and the VTY user interface uses numbers 24 through 39. To view all user interfaces currently supported and their absolute numbers, use the display user-interface command without any parameters. Relative numbering specifies a user interface or a group of user interfaces of a specific type. The number is valid only when used under that type of user interface. It is invalid when used under other types of user interfaces. Relative numbering numbers a user interface in the form of user interface type + number. The rules of relative numbering are as follows: Console ports are numbered from 0 in the ascending order, with a step of 1. AUX ports are numbered from 0 in the ascending order, with a step of 1. VTYs are numbered from 0 in the ascending order, with a step of 1. User interface configuration task list Complete these tasks to configure a user interface: Task Configuring user interface attributes Configuring common settings for user interfaces Configuring a command to be automatically executed Configuring user privilege level under a user interface Configuring access control on VTY user interfaces Configuring supported protocols on VTY user interfaces Configuring authentication mode Configuring command authorization Remarks Optional Optional Optional Optional Optional Optional Optional Optional 27

30 Task Configuring command accounting Defining shortcut keys for starting terminal sessions/aborting tasks Sending messages to the specified user interfaces Releasing the connection established on the user interfaces Remarks Optional Optional Optional Optional Configuring user interface attributes Configuring asynchronous serial interface attributes For users to telnet to Device B from Device A, you can connect Device A to Device B through the asynchronous serial interfaces, and configure the redirect enable and redirect listen-port port-number commands on Device A. Then, users can use the telnet DeviceA s-ip-address port-number command to log in to Device B. To facilitate the user login operation, you can associate the Telnet redirect listening port with Device A s IP address by using the ip alias ip-address port-number command, so that users only need to enter telnet IP-address to log in to Device B. To configure asynchronous attributes of a serial interface (AUX port or console port): 1. Enter system view. system-view N/A 2. Enter user interface view. 3. Configure the transmission rate. 4. Configure the data bits for each character. 5. Configure a parity check method. 6. Configure the number of stop bits transmitted per byte. user-interface { first-num1 [ last-num1 ] { aux console } first-num2 [ last-num2 ] } speed speed-value databits { } parity { even mark none odd space } stopbits { } N/A 9600 bps by default. The setting depends on the contexts to be transmitted, For example, you can set it to 7 if standard ASCII characters are to be sent; set it to 8 if extended ASCII characters are to be sent. 8 by default. None by default. 1 by default. 7. Detect the stop bits. stopbit-error intolerance By default, stop bits are not detected. 28

31 8. Configure the flow control mode. 9. Associate the Telnet redirect listening port with an IP address. flow-control { hardware software none } ip alias ip-address port-number By default, the flow control mode is none. The switch does not support the hardware and software keywords. By default, no IP address is associated with the Telnet redirect listening port. Configuring common settings for user interfaces To configure user interface attributes: 1. Enter system view. system-view N/A 2. Enter user interface view. user-interface { first-num1 [ last-num1 ] { aux console vty } first-num2 [ last-num2 ] } N/A 3. Start the terminal service. shell 4. Set the idle-timeout disconnection function for terminal users. idle-timeout minutes [ seconds ] The terminal service is enabled on all user interfaces by default. 10 minutes by default. 5. Set the maximum number of lines on a screen. 6. Set the display type of the current user terminal. screen-length screen-length terminal type { ansi vt100 } By default, up to 24 lines of data are displayed on a screen. ANSI by default. 7. Set the size of the history command buffer of the user interface. history-command size-value max-size The history buffer can store 10 commands by default. 8. Return to user view. return N/A 9. Lock the user interface to prevent unauthorized users from using this interface. lock Disabled by default. NOTE: The system supports two types of terminal display: ANSI and VT100. If the terminal display of the switch and the client (for example, hyper terminal or Telnet terminal) is inconsistent or is set to ANSI, and if the total number of the characters of the command line that is being used exceeds 80, anomalies such as cursor corruption or abnormal display of the terminal display may occur on the client. H3C recommends you to set the display type of both the switch and the client to VT

32 Configuring a command to be automatically executed The system automatically executes a command when a user logs in by using the user interface where auto-execute command is configured. The system ends the user connection after the command completes. If the auto-execution command command triggers another task or connection, the system does not end the user connection until the task completes or the triggered connection breaks down. A good example is configuring the auto-execute command telnet command to let users automatically telnet to the specified host. To configure auto-execute command: 1. Enter system view. system-view N/A 2. Enter user interface view. 3. Configure the command to be automatically executed. user-interface { first-num1 [ last-num1 ] { aux vty } first-num2 [ last-num2 ] } auto-execute command command N/A The console port does not support this command. By default, no command is set to be automatically executed. The system automatically executes the specified command when a user logs in to the user interface, and terminates the user connection after the command completes. If the command triggers another task, the system does not terminate the user connection until that task completes. CAUTION: The auto-execute command command may disable you from configuring the system through the user interface to which the command is applied. Therefore, before configuring the command and saving the configuration (by using the save command), make sure that you can access the switch by other user interfaces to remove the configuration in case a problem occurs. Configuring user privilege level under a user interface User privilege level restricts the access rights of different users to the switch: If the authentication mode is scheme when a user logs in, which means username and password are needed, and SSH public key authentication is adopted, the privilege level of the user is the user interface level, which is configured in user interface view. The default user interface level is 0. If the authentication mode is none or password when a user logs in, which means no username is needed, the privilege level of the user is the user interface level. 30

33 To configure the user privilege level under a user interface: 1. Enter system view. system-view N/A 2. Enter user interface view. 3. Configure user s privilege level under the current user interface. user-interface { first-num1 [ last-num1 ] { aux console vty } first-num2 [ last-num2 ] } user privilege level level N/A By default, users logging in through console port have a privilege level of 3; users logging in through other user interfaces have a privilege level of 0. NOTE: For more information about user levels, see the chapter Using the CLI. The user privilege level can be configured under a user interface or by setting AAA authentication parameters, and which configuration mode takes effect depends on the authentication mode at user login. For more information, see the chapter Using the CLI. Configuring access control on VTY user interfaces You can configure access control on the VTY user interface by referencing an ACL. For more information about ACL, see ACL and QoS Configuration Guide. To control access to VTY user interfaces: 1. Enter system view. system-view N/A 2. Enter VTY user interface view. 3. Control access to the VTY user interface. user-interface { first-num1 [ last-num1 ] vty first-num2 [ last-num2 ] } By referencing a basic/advanced ACL: acl [ ipv6 ] acl-number { inbound outbound } By referencing a WLAN/Ethernet frame header ACL: acl acl-number inbound N/A Use either command. No access control is set by default. Configuring supported protocols on VTY user interfaces To configure supported protocols on the active VTY user interface: 31

User authentication configuration example 11 Command authorization configuration example 13 Command accounting configuration example 14

User authentication configuration example 11 Command authorization configuration example 13 Command accounting configuration example 14 Contents Logging in to the CLI 1 Login methods 1 Logging in through the console or AUX port 2 Logging in through Telnet 5 Telnetting to the switch 5 Telnetting from the switch to another device 7 Logging

More information

Logging in to the CLI

Logging in to the CLI Contents Logging in to the CLI 1 Login methods 1 Logging in through the console port 2 Introduction 2 Configuration procedure 2 Logging in through the AUX port 5 Configuration prerequisites 5 Configuration

More information

Login management commands

Login management commands Contents Login management commands 1 CLI login configuration commands 1 display telnet client configuration 1 telnet 1 telnet ipv6 2 telnet server enable 3 User interface configuration commands 3 acl (user

More information

HP Load Balancing Module

HP Load Balancing Module HP Load Balancing Module System Management Configuration Guide Part number: 5998-4216 Software version: Feature 3221 Document version: 6PW100-20130326 Legal and notice information Copyright 2013 Hewlett-Packard

More information

Operation Manual Login and User Interface. Table of Contents

Operation Manual Login and User Interface. Table of Contents Table of Contents Table of Contents Chapter 1 Switch Login... 1-1 1.1 Setting Up Configuration Environment Through the Console Port... 1-1 1.2 Setting Up Configuration Environment Through Telnet... 1-2

More information

Table of Contents 1 Commands for Access Controller Switch Interface Board 1-1

Table of Contents 1 Commands for Access Controller Switch Interface Board 1-1 Table of Contents 1 Commands for Access Controller Switch Interface Board 1-1 Commands for Access Controller and Access Controller Switch Interface Board 1-1 acl (user interface view) 1-1 activation-key

More information

HP High-End Firewalls

HP High-End Firewalls HP High-End Firewalls Getting Started Guide Part number: 5998-2646 Software version: F1000-A-EI&F1000-S-EI: R3721 F5000: F3210 F1000-E: F3171 Firewall module: F3171 Document version: 6PW101-20120719 Legal

More information

Contents. Configuring SSH 1

Contents. Configuring SSH 1 Contents Configuring SSH 1 Overview 1 How SSH works 1 SSH authentication methods 2 SSH support for Suite B 3 FIPS compliance 3 Configuring the device as an SSH server 4 SSH server configuration task list

More information

Table of Contents. 2 MIB Style Configuration 2-1 Setting the MIB Style 2-1 Displaying and Maintaining MIB 2-1

Table of Contents. 2 MIB Style Configuration 2-1 Setting the MIB Style 2-1 Displaying and Maintaining MIB 2-1 Table of Contents 1 SNMP Configuration 1-1 SNMP Overview 1-1 SNMP Mechanism 1-1 SNMP Protocol Version 1-2 MIB Overview 1-2 SNMP Configuration 1-3 Configuring SNMP Logging 1-5 Introduction to SNMP Logging

More information

Table of Contents 1 SSH Configuration 1-1

Table of Contents 1 SSH Configuration 1-1 Table of Contents 1 SSH Configuration 1-1 SSH Overview 1-1 Introduction to SSH 1-1 Algorithm and Key 1-1 Asymmetric Key Algorithm 1-2 SSH Operating Process 1-2 Configuring the SSH Server 1-4 SSH Server

More information

Table of Contents. 2 MIB Style Configuration 2-1 Overview 2-1 Setting the MIB Style 2-1 Displaying and Maintaining MIB 2-1

Table of Contents. 2 MIB Style Configuration 2-1 Overview 2-1 Setting the MIB Style 2-1 Displaying and Maintaining MIB 2-1 Table of Contents 1 SNMP Configuration 1-1 SNMP Overview 1-1 SNMP Mechanism 1-1 SNMP Protocol Versions 1-2 MIB Overview 1-2 Configuring SNMP 1-3 Configuring SNMPv3 1-3 Configuring SNMPv1 and SNMPv2c 1-4

More information

Configuring the Management Interface and Security

Configuring the Management Interface and Security CHAPTER 5 Configuring the Management Interface and Security Revised: February 15, 2011, Introduction This module describes how to configure the physical management interfaces (ports) as well as the various

More information

Operation Manual SNMP-RMON H3C S3610&S5510 Series Ethernet Switches. Table of Contents

Operation Manual SNMP-RMON H3C S3610&S5510 Series Ethernet Switches. Table of Contents Table of Contents Table of Contents... 1-1 1.1 SNMP Overview... 1-1 1.1.1 SNMP Mechanism... 1-1 1.1.2 SNMP Protocol Version... 1-2 1.1.3 MIB Overview... 1-2 1.2 SNMP Configuration... 1-2 1.3 Trap Configuration...

More information

Using Cisco IOS XE Software

Using Cisco IOS XE Software This chapter describes the basics of using the Cisco IOS XE software and includes the following section: Accessing the CLI Using a Router Console, on page 1 Accessing the CLI Using a Router Console Before

More information

Operation Manual AAA RADIUS HWTACACS H3C S5500-EI Series Ethernet Switches. Table of Contents

Operation Manual AAA RADIUS HWTACACS H3C S5500-EI Series Ethernet Switches. Table of Contents Table of Contents Table of Contents... 1-1 1.1 AAA/RADIUS/HWTACACS Over... 1-1 1.1.1 Introduction to AAA... 1-1 1.1.2 Introduction to RADIUS... 1-3 1.1.3 Introduction to HWTACACS... 1-9 1.1.4 Protocols

More information

HP A3100 v2 Switch Series

HP A3100 v2 Switch Series HP A3100 v2 Switch Series Fundamentals Command Reference HP A3100-8 v2 SI Switch (JG221A) HP A3100-16 v2 SI Switch (JG222A) HP A3100-24 v2 SI Switch (JG223A) HP A3100-8 v2 EI Switch (JD318B) HP A3100-16

More information

H3C WA Series WLAN Access Points. Fundamentals Command Reference

H3C WA Series WLAN Access Points. Fundamentals Command Reference H3C WA Series WLAN Access Points Fundamentals Command Reference Abstract This document details the commands for the WA series WLAN access points. Intended audience includes network planners, field technical

More information

Table of Contents. 2 MIB Configuration Commands 2-1 MIB Configuration Commands 2-1 display mib-style 2-1 mib-style 2-1

Table of Contents. 2 MIB Configuration Commands 2-1 MIB Configuration Commands 2-1 display mib-style 2-1 mib-style 2-1 Table of Contents 1 SNMP Configuration Commands 1-1 SNMP Configuration Commands 1-1 display snmp-agent community 1-1 display snmp-agent group 1-2 display snmp-agent local-engineid 1-3 display snmp-agent

More information

HP 3600 v2 Switch Series

HP 3600 v2 Switch Series HP 3600 v2 Switch Series Fundamentals Command Reference Part number: 5998-2359 Software version: Release 2101 Document version: 6W101-20130930 Legal and notice information Copyright 2013 Hewlett-Packard

More information

Command Manual SNMP-RMON. Table of Contents

Command Manual SNMP-RMON. Table of Contents Table of Contents Table of Contents... 1-1 1.1 SNMP Configuration Commands... 1-1 1.1.1 display snmp-agent... 1-1 1.1.2 display snmp-agent community... 1-2 1.1.3 display snmp-agent group... 1-3 1.1.4 display

More information

H3C SecBlade IPS Cards

H3C SecBlade IPS Cards H3C SecBlade IPS Cards User Manual Hangzhou H3C Technologies Co., Ltd. http://www.h3c.com Document version: 5PW104-20101210 Copyright 2008-2010, Hangzhou H3C Technologies Co., Ltd. and its licensors All

More information

Portal configuration commands

Portal configuration commands Contents Portal configuration commands 1 display portal acl 1 display portal connection statistics 5 display portal free-rule 7 display portal interface 9 display portal-roaming 11 display portal server

More information

Table of Contents. 2 MIB Configuration Commands 2-1 display mib-style 2-1 mib-style 2-1

Table of Contents. 2 MIB Configuration Commands 2-1 display mib-style 2-1 mib-style 2-1 Table of Contents 1 SNMP Configuration Commands 1-1 SNMP Configuration Commands 1-1 display snmp-agent community 1-1 display snmp-agent group 1-2 display snmp-agent local-engineid 1-3 display snmp-agent

More information

HP 3600 v2 Switch Series

HP 3600 v2 Switch Series HP 3600 v2 Switch Series Fundamentals Command Reference Part number: 5998-7608 Software version: Release 2110P02 Document version: 6W100-20150305 Legal and notice information Copyright 2015 Hewlett-Packard

More information

Configure SNMP. Understand SNMP. This chapter explains Simple Network Management Protocol (SNMP) as implemented by Cisco NCS 4000 series.

Configure SNMP. Understand SNMP. This chapter explains Simple Network Management Protocol (SNMP) as implemented by Cisco NCS 4000 series. This chapter explains Simple Network Management Protocol (SNMP) as implemented by Cisco NCS 4000 series. Understand SNMP, page 1 Basic SNMP Components, page 2 SNMPv3 Support, page 3 SNMP Traps, page 4

More information

Table of Contents 1 SNMP Configuration Commands RMON Configuration Commands 2-1

Table of Contents 1 SNMP Configuration Commands RMON Configuration Commands 2-1 Table of Contents 1 SNMP Configuration Commands 1-1 SNMP Configuration Commands 1-1 display snmp-agent 1-1 display snmp-agent community 1-1 display snmp-agent group 1-3 display snmp-agent mib-view 1-4

More information

Operation Manual SNMP. Table of Contents

Operation Manual SNMP. Table of Contents Table of Contents Table of Contents... 1-1 1.1 SNMP Overview... 1-1 1.1.1 Introduction to SNMP... 1-1 1.1.2 SNMP Versions and Supported MIB... 1-1 1.2 Configuring SNMP... 1-3 1.2.1 Setting Community Names...

More information

Table of Contents 1 AAA Overview AAA Configuration 2-1

Table of Contents 1 AAA Overview AAA Configuration 2-1 Table of Contents 1 AAA Overview 1-1 Introduction to AAA 1-1 Authentication 1-1 Authorization 1-1 Accounting 1-2 Introduction to ISP Domain 1-2 Introduction to AAA Services 1-3 Introduction to RADIUS 1-3

More information

Table of Contents 1 FTP and SFTP Configuration TFTP Configuration 2-1

Table of Contents 1 FTP and SFTP Configuration TFTP Configuration 2-1 Table of Contents 1 FTP and SFTP Configuration 1-1 Introduction to FTP and SFTP 1-1 Introduction to FTP 1-1 Introduction to SFTP 1-1 FTP Configuration 1-2 FTP Configuration: A Switch Operating as an FTP

More information

ZyWALL 70. Internet Security Appliance. Quick Start Guide Version 3.62 December 2003

ZyWALL 70. Internet Security Appliance. Quick Start Guide Version 3.62 December 2003 ZyWALL 70 Internet Security Appliance Quick Start Guide Version 3.62 December 2003 Introducing the ZyWALL The ZyWALL 70 is the ideal secure gateway for all data passing between the Internet and the LAN.

More information

The Security feature available on the ME 1200 Web GUI allows you to set the security configurations for

The Security feature available on the ME 1200 Web GUI allows you to set the security configurations for The Security feature available on the ME 1200 Web GUI allows you to set the security configurations for the ME 1200. Switch, page 1 Network, page 16 Switch Users Configuration This option provides an overview

More information

Operation Manual SSH H3C S3610&S5510 Series Ethernet Switches. Table of Contents

Operation Manual SSH H3C S3610&S5510 Series Ethernet Switches. Table of Contents Table of Contents Table of Contents... 1-1 1.1 SSH Overview... 1-1 1.2 Configuring the SSH Server... 1-5 1.2.1 Enabling SSH Server... 1-5 1.2.2 Configuring the Protocols for the SSH Client User Interface

More information

Examples of Cisco APE Scenarios

Examples of Cisco APE Scenarios CHAPTER 5 This chapter describes three example scenarios with which to use Cisco APE: Access to Asynchronous Lines, page 5-1 Cisco IOS Shell, page 5-3 Command Authorization, page 5-5 Note For intructions

More information

Configuring Management Access

Configuring Management Access 37 CHAPTER This chapter describes how to access the ASA for system management through Telnet, SSH, and HTTPS (using ASDM), how to authenticate and authorize users, how to create login banners, and how

More information

Configuring Switch Security

Configuring Switch Security CHAPTER 9 The authentication, authorization, and accounting (AAA) mechanism verifies the identity of, grants access to, and tracks the actions of users managing a switch. The Cisco MDS 9020 Fabric Switch

More information

H3C SecBlade NetStream Card Configuration Examples

H3C SecBlade NetStream Card Configuration Examples H3C SecBlade NetStream Card Configuration Examples Copyright 2012 Hangzhou H3C Technologies Co., Ltd. All rights reserved. No part of this manual may be reproduced or transmitted in any form or by any

More information

Table of Contents 1 AAA Overview AAA Configuration 2-1

Table of Contents 1 AAA Overview AAA Configuration 2-1 Table of Contents 1 AAA Overview 1-1 Introduction to AAA 1-1 Authentication 1-1 Authorization 1-1 Accounting 1-2 Introduction to ISP Domain 1-2 Introduction to AAA Services 1-2 Introduction to RADIUS 1-2

More information

Configuring Security for the ML-Series Card

Configuring Security for the ML-Series Card 19 CHAPTER Configuring Security for the ML-Series Card This chapter describes the security features of the ML-Series card. This chapter includes the following major sections: Understanding Security, page

More information

Table of Contents. 4 System Guard Configuration 4-1 System Guard Overview 4-1 Guard Against IP Attacks 4-1 Guard Against TCN Attacks 4-1

Table of Contents. 4 System Guard Configuration 4-1 System Guard Overview 4-1 Guard Against IP Attacks 4-1 Guard Against TCN Attacks 4-1 Table of Contents 1 802.1x Configuration 1-1 Introduction to 802.1x 1-1 Architecture of 802.1x Authentication 1-1 The Mechanism of an 802.1x Authentication System 1-3 Encapsulation of EAPoL Messages 1-3

More information

Part number: Published: March Com Switch 4500 Family Configuration Guide

Part number: Published: March Com Switch 4500 Family Configuration Guide http://www.3com.com/ Part number: 10015003 Published: March 2006 3Com Switch 4500 Family Configuration Guide 3Com Corporation 350 Campus Drive Marlborough, MA USA 01752-3064 Copyright 2006, 3Com Corporation.

More information

Lab Configuring and Verifying Extended ACLs Topology

Lab Configuring and Verifying Extended ACLs Topology Topology 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 8 Addressing Table Objectives Device Interface IP Address Subnet Mask Default Gateway R1 G0/1 192.168.10.1

More information

Cisco IOS Firewall Authentication Proxy

Cisco IOS Firewall Authentication Proxy Cisco IOS Firewall Authentication Proxy This feature module describes the Cisco IOS Firewall Authentication Proxy feature. It includes information on the benefits of the feature, supported platforms, configuration

More information

ZyWALL 10W. Internet Security Gateway. Quick Start Guide Version 3.62 December 2003

ZyWALL 10W. Internet Security Gateway. Quick Start Guide Version 3.62 December 2003 Internet Security Gateway Quick Start Guide Version 3.62 December 2003 Introducing the ZyWALL The is the ideal secure gateway for all data passing between the Internet and the LAN. By integrating NAT,

More information

HP High-End Firewalls

HP High-End Firewalls HP High-End Firewalls Access Control Configuration Guide Part number: 5998-2648 Software version: F1000-A-EI&F1000-S-EI: R3721 F5000: F3210 F1000-E: F3171 Firewall module: F3171 Document version: 6PW101-20120719

More information

Configuring Communication Services

Configuring Communication Services This chapter includes the following sections: Configuring HTTP, on page 1 Configuring SSH, on page 2 Configuring XML API, on page 3 Enabling Redfish, on page 3 Configuring IPMI, on page 4 Configuring SNMP,

More information

Index. Numerics. Index 1

Index. Numerics. Index 1 Index Numerics 3DES 7-3, 8-3 802.1x See port-based access control. A aaa authentication 5-8 aaa authenticaton web browser 6-11 aaa port-access See Web or MAC Authentication. access levels, authorized IP

More information

Administration of Cisco WLC

Administration of Cisco WLC Using the Controller Interface, on page 1 Enabling Web and Secure Web Modes, on page 6 Telnet and Secure Shell Sessions, on page 8 Management over Wireless, on page 13 Configuring Management using Dynamic

More information

Securing Wireless LAN Controllers (WLCs)

Securing Wireless LAN Controllers (WLCs) Securing Wireless LAN Controllers (WLCs) Document ID: 109669 Contents Introduction Prerequisites Requirements Components Used Conventions Traffic Handling in WLCs Controlling Traffic Controlling Management

More information

Configure Site Network Settings

Configure Site Network Settings About Global Network Settings, page 1 About Device Credentials, page 2 Configure Global Device Credentials, page 4 Configure IP Address Pools, page 9 Configure Global Network Servers, page 9 Configure

More information

HP Load Balancing Module

HP Load Balancing Module HP Load Balancing Module System Maintenance Configuration Guide Part number: 5998-4221 Software version: Feature 3221 Document version: 6PW100-20130326 Legal and notice information Copyright 2013 Hewlett-Packard

More information

Configuring a Terminal/Comm Server

Configuring a Terminal/Comm Server Configuring a Terminal/Comm Server Document ID: 5466 Introduction Prerequisites Requirements Components Used Conventions Cabling Design Strategy Configure Network Diagram Configurations Command Summary

More information

Configuring Terminal Settings and Sessions

Configuring Terminal Settings and Sessions This chapter contains the following sections: Information About Terminal Settings and Sessions, page 1 Configuring the Console Port, page 3 Configuring the COM1 Port, page 5 Configuring Virtual Terminals,

More information

DGS Layer 2 Switch. Command Line Interface Reference Manual 6DGS3024C.04 RECYCLABLE. Fourth Edition (August 2006)

DGS Layer 2 Switch. Command Line Interface Reference Manual 6DGS3024C.04 RECYCLABLE. Fourth Edition (August 2006) DGS-3024 Layer 2 Switch Command Line Interface Reference Manual Fourth Edition (August 2006) 6DGS3024C.04 RECYCLABLE Table of Contents Introduction... 1 Using the Console CLI... 3 Command... 7 Basic Switch

More information

24-Port Gigabit with 4 Optional 10G Slots. Layer 3 Managed Stackable Switch XGS Quick Installation Guide

24-Port Gigabit with 4 Optional 10G Slots. Layer 3 Managed Stackable Switch XGS Quick Installation Guide 24-Port Gigabit with 4 Optional 10G Slots Layer 3 Managed Stackable Switch XGS3-24040 Quick Installation Guide Table of Contents 1. Package Content... 3 2. Switch Management... 4 3. Requirements... 5 4.

More information

RADIUS Configuration. Overview. Introduction to RADIUS. Client/Server Model

RADIUS Configuration. Overview. Introduction to RADIUS. Client/Server Model Table of Contents RADIUS Configuration 1 Overview 1 Introduction to RADIUS 1 Client/Server Model 1 Security and Authentication Mechanisms 2 Basic Message Exchange Process of RADIUS 2 RADIUS Packet Format

More information

HP 5920 & 5900 Switch Series

HP 5920 & 5900 Switch Series HP 5920 & 5900 Switch Series Fundamentals Configuration Guide Part number: 5998-2891 Software version: Release 2210 Document version: 6W100-20131105 Legal and notice information Copyright 2013 Hewlett-Packard

More information

Implementing IPv6 for Network Management

Implementing IPv6 for Network Management Implementing IPv6 for Network Management Last Updated: August 1, 2012 This document describes the concepts and commands used to manage Cisco applications over IPv6 and to implement IPv6 for network management.

More information

Configuring Authentication Proxy

Configuring Authentication Proxy The Cisco IOS Firewall Authentication Proxy feature provides dynamic, per-user authentication and authorization, authenticating users against industry standard TACACS+ and RADIUS authentication protocols.

More information

aaa max-sessions maximum-number-of-sessions The default value for aaa max-sessions command is platform dependent. Release 15.0(1)M.

aaa max-sessions maximum-number-of-sessions The default value for aaa max-sessions command is platform dependent. Release 15.0(1)M. aaa max-sessions aaa max-sessions To set the maximum number of simultaneous authentication, authorization, and accounting (AAA) connections permitted for a user, use the aaa max-sessions command in global

More information

Teacher s Reference Manual

Teacher s Reference Manual UNIVERSITY OF MUMBAI Teacher s Reference Manual Subject: Security in Computing Practical with effect from the academic year 2018 2019 Practical 1: Packet Tracer - Configure Cisco Routers for Syslog, NTP,

More information

HP MSR Router Series. Terminal Access Configuration Guide(V5) Part number: Software version: CMW520-R2509 Document version: 6PW

HP MSR Router Series. Terminal Access Configuration Guide(V5) Part number: Software version: CMW520-R2509 Document version: 6PW HP MSR Router Series Terminal Access Configuration Guide(V5) Part number: 5998-2022 Software version: CMW520-R2509 Document version: 6PW102-20130925 Legal and notice information Copyright 2013 Hewlett-Packard

More information

Configuring Lock-and-Key Security (Dynamic Access Lists)

Configuring Lock-and-Key Security (Dynamic Access Lists) Configuring Lock-and-Key Security (Dynamic Access Lists) Feature History Release Modification Cisco IOS For information about feature support in Cisco IOS software, use Cisco Feature Navigator. This chapter

More information

User s Guide. SNMPWEBCARD Firmware Version Revision 3

User s Guide. SNMPWEBCARD Firmware Version Revision 3 WARRANTY REGISTRATION: register online today for a chance to win a FREE Tripp Lite product www.tripplite.com/warranty User s Guide SNMPWEBCARD Firmware Version 12.06.0062 Revision 3 Table of Contents 1.

More information

Passwords and Privileges Commands

Passwords and Privileges Commands Passwords and Privileges Commands This chapter describes the commands used to establish password protection and configure privilege levels. Password protection lets you restrict access to a network or

More information

CCNA Security PT Practice SBA

CCNA Security PT Practice SBA A few things to keep in mind while completing this activity: 1. Do not use the browser Back button or close or reload any Exam windows during the exam. 2. Do not close Packet Tracer when you are done.

More information

Configuring Security Features on an External AAA Server

Configuring Security Features on an External AAA Server CHAPTER 3 Configuring Security Features on an External AAA Server The authentication, authorization, and accounting (AAA) feature verifies the identity of, grants access to, and tracks the actions of users

More information

Enabling Remote Access to the ACE

Enabling Remote Access to the ACE CHAPTER 3 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. All features described in this chapter are supported with IPv6 unless otherwise

More information

Administration of Cisco WLC

Administration of Cisco WLC HTTP/HTTPS, SSH/Telnet to Cisco WLC, page 1 HTTP/HTTPS, SSH/Telnet to Cisco WLC Using the Controller GUI A browser-based GUI is built into each controller. It allows up to five users to simultaneously

More information

Console Port, Telnet, and SSH Handling

Console Port, Telnet, and SSH Handling Console Port Overview, on page 1 Connecting Console Cables, on page 1 Installing USB Device Drivers, on page 1 Console Port Handling Overview, on page 2 Telnet and SSH Overview, on page 2 Persistent Telnet,

More information

Configuring RADIUS and TACACS+

Configuring RADIUS and TACACS+ 28 CHAPTER The authentication, authorization, and accounting (AAA) mechanism verifies the identity of, grants access to, and tracks the actions of users managing a switch. All Cisco MDS 9000 Family switches

More information

Configuring Secure Shell (SSH)

Configuring Secure Shell (SSH) Prerequisites for Configuring Secure Shell, page 1 Restrictions for Configuring Secure Shell, page 2 Information About Configuring Secure Shell, page 2 How to Configure Secure Shell, page 4 Monitoring

More information

H3C SecPath Series Security Products

H3C SecPath Series Security Products Web-Based Configuration Manual Hangzhou H3C Technologies Co., Ltd. http://www.h3c.com Manual Version: T2-08018U-20070625-C-2.01 Copyright 2007, Hangzhou H3C Technologies Co., Ltd. and its licensors All

More information

CCNA Security 1.0 Student Packet Tracer Manual

CCNA Security 1.0 Student Packet Tracer Manual 1.0 Student Packet Tracer Manual This document is exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document for non-commercial distribution and exclusive use by instructors

More information

Configuring Authentication Proxy

Configuring Authentication Proxy Configuring Authentication Proxy Last Updated: January 18, 2012 The Cisco IOS Firewall Authentication Proxy feature provides dynamic, per-user authentication and authorization, authenticating users against

More information

Configuring Authentication Proxy

Configuring Authentication Proxy Configuring Authentication Proxy Last Updated: January 7, 2013 The Cisco IOS Firewall Authentication Proxy feature provides dynamic, per-user authentication and authorization, authenticating users against

More information

Privilege Level Switching Authentication Technology White Paper

Privilege Level Switching Authentication Technology White Paper Privilege Level Switching Authentication Technology White Paper Keywords: Privilege level switching authentication, RADIUS, HWTACACS Abstract: This document briefly describes the background and implementation

More information

Configuring the WMIC for the First Time

Configuring the WMIC for the First Time Configuring the WMIC for the First Time This document describes how to configure basic settings on a Cisco Wireless Mobile Interface Card (WMIC) for the first time. Before You Start Before you install

More information

Controlled/uncontrolled port and port authorization status

Controlled/uncontrolled port and port authorization status Contents 802.1X fundamentals 1 802.1X architecture 1 Controlled/uncontrolled port and port authorization status 1 802.1X-related protocols 2 Packet formats 2 EAP over RADIUS 4 Initiating 802.1X authentication

More information

Cisco - Connecting Routers Back-to-Back Through the AUX Ports using a Rollover Cable

Cisco - Connecting Routers Back-to-Back Through the AUX Ports using a Rollover Cable 1 of 5 6/12/2001 1:43 PM Connecting Routers Back-to-Back Through the AUX Ports using a Rollover Cable Contents Introduction Conventions Network Diagram Configurations Troubleshooting the Configuration

More information

Implementing IPv6 for Network Management

Implementing IPv6 for Network Management Implementing IPv6 for Network Management Last Updated: July 31, 2012 This document describes the concepts and commands used to manage Cisco applications over IPv6 and to implement IPv6 for network management.

More information

Using the Command-Line Interface

Using the Command-Line Interface Information About, page 1 How to Use the CLI to Configure Features, page 5 Information About Command Modes The Cisco IOS user interface is divided into many different modes. The commands available to you

More information

Chapter 3 Managing System Settings

Chapter 3 Managing System Settings Chapter 3 Managing System Settings Using the System Settings Utility The navigation pane at the top of the web browser interface contains a System tab that enables you to manage your FS700TSSmart Switch

More information

upgrade-mp through xlate-bypass Commands

upgrade-mp through xlate-bypass Commands CHAPTER 33 upgrade-mp To upgrade the maintenance partition software, use the upgrade-mp command. upgrade-mp {http[s]://[user:password@]server[:port]/pathname tftp[://server/pathname]} tftp http[s] server

More information

Operation Manual Security. Table of Contents

Operation Manual Security. Table of Contents Table of Contents Table of Contents Chapter 1 802.1x Configuration... 1-1 1.1 802.1x Overview... 1-1 1.1.1 802.1x Standard Overview... 1-1 1.1.2 802.1x System Architecture... 1-1 1.1.3 802.1x Authentication

More information

Configuring Security with Passwords, Privileges, and Logins

Configuring Security with Passwords, Privileges, and Logins Configuring Security with Passwords, Privileges, and Logins Cisco IOS based networking devices provide several features that can be used to implement basic security for CLI sessions using only the operating

More information

Access Control List Enhancements on the Cisco Series Router

Access Control List Enhancements on the Cisco Series Router Access Control List Enhancements on the Cisco 12000 Series Router Part Number, May 30, 2008 The Cisco 12000 series router filters IP packets using access control lists (ACLs) as a fundamental security

More information

Defining IPsec Networks and Customers

Defining IPsec Networks and Customers CHAPTER 4 Defining the IPsec Network Elements In this product, a VPN network is a unique group of targets; a target can be a member of only one network. Thus, a VPN network allows a provider to partition

More information

Implementing IPv6 for Network Management

Implementing IPv6 for Network Management Implementing IPv6 for Network Management Last Updated: December 1, 2011 This document describes the concepts and commands used to manage Cisco applications over IPv6 and to implement IPv6 for network management.

More information

Using the Command-Line Interface

Using the Command-Line Interface CHAPTER 2 This chapter describes the Cisco IOS command-line interface (CLI) and how to use it to configure your Cisco ME 3400 Ethernet Access switch. It contains these sections: Understanding Command Modes,

More information

Lab - Troubleshooting Standard IPv4 ACL Configuration and Placement Topology

Lab - Troubleshooting Standard IPv4 ACL Configuration and Placement Topology Lab - Troubleshooting Standard IPv4 ACL Configuration and Placement Topology 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 8 Addressing Table Objectives

More information

DGS-3630-Series Switches

DGS-3630-Series Switches DGS-3630-Series Switches Switch Management Interfaces Adding Administrator Account Enabling Remote Management (SSH) Changing Switch IP Address Saving Configuration Resetting to Factory Defaults Switch

More information

Management Access. Configure Management Remote Access. Configure ASA Access for ASDM, Telnet, or SSH

Management Access. Configure Management Remote Access. Configure ASA Access for ASDM, Telnet, or SSH This chapter describes how to access the Cisco ASA for system management through Telnet, SSH, and HTTPS (using ASDM), how to authenticate and authorize users, and how to create login banners. Configure

More information

CHAPTER 2 ACTIVITY

CHAPTER 2 ACTIVITY CHAPTER 2 ACTIVITY 2.1.1.1 1. CLI stands for 2. GUI stands for 3. Write the step you used to go to CLI interface on Windows 4. The OS, normally loads from a disk drive, into RAM. 5. The portion of the

More information

L2TP Configuration. L2TP Overview. Introduction. Typical L2TP Networking Application

L2TP Configuration. L2TP Overview. Introduction. Typical L2TP Networking Application Table of Contents L2TP Configuration 1 L2TP Overview 1 Introduction 1 Typical L2TP Networking Application 1 Basic Concepts of L2TP 2 L2TP Tunneling Modes and Tunnel Establishment Process 4 L2TP Features

More information

Lab Using the CLI to Gather Network Device Information Topology

Lab Using the CLI to Gather Network Device Information Topology Topology Addressing Table Objectives Device Interface IP Address Subnet Mask Default Gateway R1 G0/1 192.168.1.1 255.255.255.0 N/A Lo0 209.165.200.225 255.255.255.224 N/A S1 VLAN 1 192.168.1.11 255.255.255.0

More information

DES-3010F / DES-3010G / DES-3018 / DES-3026

DES-3010F / DES-3010G / DES-3018 / DES-3026 DES-3010F / DES-3010G / DES-3018 / DES-3026 Managed 8/16/24-port 10/100Mbps N-Way Fast Ethernet Switch Command Line Interface Reference Manual First Edition (May 2005) 651ES3026015 Printed In Taiwan RECYCLABLE

More information

Initial Configuration for the Switch

Initial Configuration for the Switch Options for Initial Configuration, page 1 Configuring the Switch Using the Web User Interface, page 1 Configuring the Switch Using the CLI, page 4 Configuring the Switch in the ROMMON Mode, page 12 Options

More information

Using Cisco IOS Software

Using Cisco IOS Software APPENDIX A This appendix describes the basics about using the Cisco IOS software that is installed on every Cisco ubr905 and Cisco ubr925 cable access routers: Accessing the Command-Line Interface, page

More information

DES Layer 2 Switch Command Line Interface Reference Manual Release ES RECYCLABLE. May 2005

DES Layer 2 Switch Command Line Interface Reference Manual Release ES RECYCLABLE. May 2005 DES-3550 Layer 2 Switch Command Line Interface Reference Manual Release 3.5 May 2005 651ES3550055 RECYCLABLE Table of Contents Introduction... 1 Using the Console CLI... 4 Command... 8 Basic Switch Commands...

More information

HP A5830 Switch Series Fundamentals. Configuration Guide. Abstract

HP A5830 Switch Series Fundamentals. Configuration Guide. Abstract HP A5830 Switch Series Fundamentals Configuration Guide Abstract This document describes the software features for the HP A Series products and guides you through the software configuration procedures.

More information