Logging in to the CLI

Size: px
Start display at page:

Download "Logging in to the CLI"

Transcription

1 Contents Logging in to the CLI 1 Login methods 1 Logging in through the console port 2 Introduction 2 Configuration procedure 2 Logging in through the AUX port 5 Configuration prerequisites 5 Configuration procedure 6 Logging in through Telnet 8 Introduction 8 Setting up a configuration environment 8 Logging in through SSH 12 Introduction 12 Logging in to the router from an SSH client 12 Configuring the SSH client to log in to the SSH server 13 Logging in through the AUX port by using modems 14 Introduction 14 Configurations on the administrator side 15 Configurations on the router 15 Setting up a configuration environment 16 Configuring user interfaces 1 User interface overview 1 Brief introduction 1 Users and user interfaces 1 Numbering user interfaces 2 User interface configuration task list 2 Configuring asynchronous serial interface attributes 3 Configuring terminal attributes 3 Configuring a command to be automatically executed 4 Configuring user privilege level under a user interface 5 Configuring access control on VTY user interfaces 6 Configuring supported protocols on VTY user interfaces 6 Configuring the authentication mode 7 Configuring command authorization 9 Configuring command accounting 9 Defining shortcut keys for starting terminal sessions/aborting tasks 10 Sending messages to the specified user interfaces 10 Releasing the connection established on user interfaces 11 Displaying and maintaining user interfaces 11 User interface configuration examples 11 User authentication configuration example 11 Command authorization configuration example 13 Command accounting configuration example 14 i

2 Logging in to the CLI Login methods You can enter the CLI of your router in the following ways to configure and manage your router. Table 1 Login methods Login method Logging in through the console port Logging in through the AUX port Default settings By default, you can log in to your router through the console port, the authentication mode is None (no username or password required), and the user privilege level is 3. By default, you cannot log in to your router through the AUX port. To do so, log in to your router through the console port, and complete the following configurations: Configure the authentication mode of AUX login users (password by default). Configure the user privilege level of AUX login users (0 by default). By default, you cannot log in to your router through Telnet. To do so, log in to your router through the console port, and complete the following configurations: Enable the Telnet function of your router. Logging in through Telnet Configure the IP address of the network management port or Ethernet interface of your router, and make sure that your router and the Telnet client can reach each other (by default, your router does not have an IP address.). Configure the authentication mode of VTY login users (password by default). Configure the user privilege level of VTY login users (0 by default). By default, you cannot log in to your router through SSH. To do so, log in to your router through the console port, and complete the following configurations: Enable the SSH server function of your router. By default, the SSH server function is disabled. Logging in through SSH Configure the IP address of the network management port or VLAN interface of your router, and make sure that your router and the SSH client can reach each other (by default, your router does not have an IP address.). Configure the authentication mode of VTY login users as scheme (password by default). Configure the user privilege level of VTY login users (0 by default). 1

3 Login method Logging in through the AUX port by using modems Default settings By default, you cannot log in to your router by using modems through the AUX port. To do so, log in to your router through the console port, and complete the following configurations: Configure the authentication mode of AUX login users (password by default). Configure the user privilege level of AUX login users (0 by default). Logging in through the console port Introduction Logging in through the console port is the most common way to log in to a router. It is also the prerequisite to configure other login methods. By default, you can log in to the router through its console port only. To log in to the router through its console port, the related configuration of the user terminal must be in accordance with that of the console port. Table 2 Default settings of a console port Setting Bits per second Flow control Parity Default 9600 bps None None Stop bits 1 Data bits 8 Configuration procedure 1. As shown in Figure 1, use the console cable shipped with the router to connect the serial port of the PC or terminal to the console port of your router. Figure 1 Setting up a configuration environment 2. Launch a terminal emulation program, such as HyperTerminal in Windows XP or Windows Here, HyperTerminal of Windows XP is used as an example. Select a serial port to be connected to the router, and set terminal parameters in this way: set Bits per second to 9600, Data bits to 8, Parity to None, Stop bits to 1, and Flow control to None, as shown in Figure 2 through Figure 4. 2

4 NOTE: On Windows 2003 Server operating system, add the HyperTerminal program first, and then log in to and manage the device as described in this document. On Windows 2008 Server, Windows 7, Windows Vista, or some other operating system, obtain a third party terminal control program first, and follow the user guide or online help of that program to log in to the device. Figure 2 Connection description Figure 3 Specifying the serial port used to establish the connection 3

5 Figure 4 Setting the properties of the serial port 3. Power on the router. You are prompted to press Enter if the router successfully completes the power-on self test (POST). The following prompt appears when you press Enter: <Sysname> #May 24 09:27:29: R5 SHELL/4/LOGIN: Trap <hh3cLogIn>: login from Console %May 24 09:27:29: R5 SHELL/5/SHELL_LOGIN: Console logged in from con0. <Sysname> 4. Execute commands to configure the router or check the running status of the router. To get help, enter?. After the steps above, you can enter the CLI to configure and manage your router. By default, users that log in from the console port are not authenticated. For security, you are recommended to change the authentication mode of the console port. The following describes how to configure password authentication. <Sysname> system-view [Sysname]user-interface console 0 [Sysname-ui-console0]authentication-mode password [Sysname-ui-console0]set authentication password cipher 123 After the configuration above, when users log in from the console port, they must enter authentication password 123 to pass authentication and then log in to the router. 4

6 NOTE: You can set the authentication mode of console login users as to none or scheme (username and password authentication). For more information about authentication modes, see Configuring the authentication mode. When users log in from the console port, you can also set other login parameters besides the authentication mode. For more information, see Configuring asynchronous serial interface attributes and Configuring terminal attributes. Logging in through the AUX port Configuration prerequisites Modifying the default settings of the AUX port Before logging in to your router through the AUX port, modify the default settings of the AUX port on the console port. Otherwise, you cannot log in to your router. To modify the default settings of the AUX port, follow these steps: 1. Log in to the router through the console port. (For more information, see Configuration procedure. ) 2. Set the authentication mode for AUX port login. 3. Set the command level to 3. <Sysname> system-view [Sysname] user-interface aux 0 [Sysname-ui-aux0] user privilege level 3 NOTE: When users log in to the router through the AUX port, they can only access commands with the command level 0 by default. For more information about command levels, see Configuring user privilege level under a user interface. Configuring terminal parameters To log in to the router through its AUX port, the related configuration of the user terminal must be in accordance with that of the AUX port. Table 3 lists the default settings of an AUX port. Table 3 Default settings of an AUX port Setting Bits per second Flow control Parity Default 9,600 bps None None Stop bits 1 Data bits 8 5

7 Configuration procedure 1. As shown in Figure 5, use a console cable to connect the serial port of your PC (or terminal) to the AUX port of your router. Figure 5 Setting up a configuration environment 2. Launch a terminal emulation program, such as HyperTerminal in Windows XP or Windows Select a serial port to be connected to the router, and set terminal parameters in this way: set Bits per second to 9600, Data bits to 8, Parity to None, Stop bits to 1, and Flow control to None, as shown in Figure 6 through Figure 8. NOTE: On Windows 2003 Server operating system, you need to add the HyperTerminal program first, and then log in to and manage the device as described in this document. On Windows 2008 Server, Windows 7, Windows Vista, or some other operating system, you need to obtain a third party terminal control program first, and follow the user guide or online help of that program to log in to the device. Figure 6 Connection description 6

8 Figure 7 Specifying the serial port used to establish the connection Figure 8 Setting the properties of the serial port 3. Power on the router. You are prompted to press Enter if the router successfully completes POST. After you press Enter, a prompt, such as <sysname> (assuming that the router name is sysname), is displayed. <sysname> 4. Execute commands to configure the router or check the running status of the router. To get help, enter?. 7

9 After the steps above, you can enter the CLI to configure and manage the router. Logging in through Telnet Introduction You can telnet to the router to remotely manage and maintain your it. To log in to your router through Telnet, perform necessary configurations on both your router and the Telnet client. Table 4 Telnet login requirements Router Router Requirement Configure the IP address of the network management or Ethernet interface of the router, make sure that the router and the Telnet client can reach each other. Enable the Telnet server by executing the telnet server enable command in system view. Configure the authentication mode for Telnet login. (For more information, see Configuring the authentication mode. Telnet client Run the Telnet program. Obtain the IP address of the network management or Ethernet interface of the router to log in. Setting up a configuration environment To log in to your router through Telnet, use either of the following methods: Use your PC as the Telnet client to telnet to your router and configure it Telnet from one router to another, with the local router as the Telnet client, and the remote router as the Telnet server. Telnetting to your router 1. Configure the IP address of the network management port of the router on the console port. IMPORTANT: You can also telnet to your router through a service port. a. Set up a configuration environment through the console port. As shown in Figure 9, use a console cable to connect the serial port of the PC to the console port of your router. Figure 9 Setting up a configuration environment 8

10 a. Launch a terminal emulation program, such as HyperTerminal in Windows XP or Windows Set the terminal parameters in this way: set Bits per second to 9600, Data bits to 8, Parity to None, Stop bits to 1, and Flow control to None. b. Power on the router. You are prompted to press Enter if the router successfully completes POST. A prompt appears after you press Enter, as shown in Figure 10. Figure 10 Configuration page a. To configure the network management port of the router as /24, execute the following commands on the hyper terminal: <Sysname> system-view [Sysname] interface M-Ethernet 0/0/0 [Sysname-M-Ethernet0/0/0] ip address IMPORTANT: If you Telnet to your router through its service port, configure the IP address of VLAN-interface 1 as /24 because the service port belongs to VLAN 1 by default. 2. Before telnetting to your router, perform necessary configurations on your router according to different authentication modes. For more information, see Configuring the authentication mode. 3. Set up a configuration environment as shown in Figure 11: Connect the Ethernet port of the PC to the network management port of your router. Make sure that the PC and router can reach each other. 9

11 Figure 11 Setting up a configuration environment 4. Run the Telnet program on the PC, and enter the IP address of the management port of the router, as shown in Figure 12. Figure 12 Running the Telnet program 5. If the authentication mode is password, the terminal displays Login authentication, and prompts you to enter the configured login password. If your password is correct, a command line prompt (for example, <Sysname>) is displayed. If All user interfaces are used, please try later! appears, try again later. 6. Execute commands to configure the router, or check the running status of the router. To get help, enter?. NOTE: When configuring your router through Telnet, do not delete or change the IP address of the network management port or VLAN interface corresponding to the Telnet connection. Otherwise, the Telnet connection may be terminated. Users that Telnet to the router can only execute command with level 0 by default. For more information about command levels, see Configuring user privilege level under a user interface. Telnetting from a router to another router You can configure a router by telnetting from another router to it. The local router operates as the Telnet client, and the remote router as the Telnet server. If the two routers are in the same LAN, you must 10

12 configure their IP addresses to be in the same segment, or make sure that the two routers can reach each other. Set up a configuration environment as shown in Figure 13. After you log in to the Telnet client, you can execute the telnet command to log in to the Telnet server to configure and manage the server. Figure 13 Telnetting from a router to another router 1. Configure the router that operates as the Telnet server. a. Enable Telnet on the Telnet server. To enable Telnet on the router: Step Command Remarks 1. Enter system view. system-view N/A 2. Enable Telnet. telnet server enable Disabled by default. b. Perform corresponding configurations on the Telnet server according to different authentication modes. For more information, see Configuring the authentication mode. 2. Log in to the router that operates as the Telnet client. 3. Execute the telnet command on the Telnet client to log in to the router that operates as the Telnet server. <Sysname> telnet xxxx xxxx is the host name, IP address, or VPN instance name of the router that operates as the Telnet server. If it is a host name, it must be a host name configured with the ip host command. To use a router as the Telnet client to log in to another router: Task Command Remarks Use the router to log in to another router in an IPv4 network. Use the router to log in to another router in an IPv6 network. telnet remote-host [ service-port ] [ [ vpn-instance vpn-instance-name ] [ source { interface interface-type interface-number ip ip-address } ] ] telnet ipv6 remote-host [ -i interface-type interface-number ] [ port-number ] [ vpn-instance vpn-instance-name ] Available in user view 4. After login, a prompt appears (for example, <Sysname>). If the All user interfaces are used, please try later! message is displayed, try again later. 5. Execute corresponding commands to configure the router, or check the running status of the router. To get help, enter?. 11

13 Logging in through SSH Introduction Secure Shell (SSH) offers an approach to log in to a remote device securely. By providing encryption and strong authentication, SSH protects devices against malicious attacks such as IP spoofing and plain text password interception. The router supports SSH, and you can log in to the switch through SSH to remotely manage and maintain the router, as shown in Figure 14. Figure 14 SSH login diagram The following table shows the configuration requirements of SSH login. Object SSH server SSH client Requirements Configure the IP address of the SSH server, and make sure the SSH server and client can reach each other. Configure the authentication mode and other settings. Run the SSH client program. Obtain the IP address of the SSH server. The router can operate as either an SSH server or client. As an SSH server: You can perform configurations on the SSH server to control SSH client login. By default, the router is disabled with the SSH server function. Before you can log in to the router through SSH, you need to log in to the router through the console port and configure the authentication mode, user level, and common settings. As an SSH client: You can log in to an SSH sever from the client to perform operations on the server. By default, the switch is enabled with the SSH client function. Logging in to the router from an SSH client Configuration prerequisites Log in to the router through the console port. For more information, see Logging in through the console port. Configuration procedure To configure the router that serves as an SSH server: 12

14 Step Command Remarks 1. Enters system view. system-view N/A 2. Create local key pair(s). public-key local create { dsa rsa } By default, no local key pair(s) are created. 3. Enable the SSH server. ssh server enable By default, SSH server is disabled. 4. Exit to system view. quit N/A 5. Enter one or more VTY user interface views. 6. Specify the scheme authentication mode. 7. Enable the current user interface to support either Telnet, SSH, or both of them. user-interface vty first-number [ last-number ] authentication-mode scheme protocol inbound { all ssh telnet } N/A By default, authentication mode for VTY user interfaces is password. By default, both protocols are supported. 8. Return to system view. quit N/A 9. Create a local user and enter local user view. 10. Set the local password. 11. Specifies the command level of the local user. 12. Specify the service type for the local user. local-user user-name password { cipher simple } password authorization-attribute level level service-type ssh By default, no local user exists. By default, no local password is set. By default, the command level is 0. By default, no service type is specified. 13. Return to system view. quit N/A 14. Create an SSH user, and specify the authentication mode for the SSH user. 15. Configure common settings for VTY user interfaces. ssh user username service-type stelnet authentication-type { password { any password-publickey publickey } assign publickey keyname } N/A By default, no SSH user exists, and no authentication mode is specified. See Configuring terminal attributes. NOTE: Login procedures from an SSH client to the router (SSH server) depend on the model of the device that serves as the SSH client. For more information, see the user guide of the device that serves as the SSH client. For more information about SSH, see Security Configuration Guide. Configuring the SSH client to log in to the SSH server Configuration prerequisites Log in to the router through the console port. For more information, see Logging in through the console port. 13

15 Figure 15 Logging in to another device from the current device NOTE: If the Telnet client and the Telnet server are not in the same subnet, make sure that the two devices can reach each other. Configuration procedure To configure the SSH client to log in to the SSH server: Task Command Remarks Log in to an IPv4 SSH server. Log in to an IPv6 SSH server. ssh2 server [ port-number ] [ vpn-instance vpn-instance-name ] [ identity-key { dsa rsa } prefer-ctos-cipher { 3des aes128 des } prefer-ctos-hmac { md5 md5-96 sha1 sha1-96 } prefer-kex { dh-group-exchange dh-group1 dh-group14 } prefer-stoc-cipher { 3des aes128 des } prefer-stoc-hmac { md5 md5-96 sha1 sha1-96 } ] * ssh2 ipv6 server [ port-number ] [ vpn-instance vpn-instance-name ] [ identity-key { dsa rsa } prefer-ctos-cipher { 3des aes128 des } prefer-ctos-hmac { md5 md5-96 sha1 sha1-96 } prefer-kex { dh-group-exchange dh-group1 dh-group14 } prefer-stoc-cipher { 3des aes128 des } prefer-stoc-hmac { md5 md5-96 sha1 sha1-96 } ] * server is the IPv4 address or host name of the server. Available in user view. server is the IPv6 address or host name of the server. Available in user view. NOTE: You can configure other settings for the router (SSH client) to work with the SSH server. For more information, see Security Configuration Guide. Logging in through the AUX port by using modems Introduction An administrator can use two modems and the Public Switched Telephone Network (PSTN) to remotely maintain a remote router through its AUX port. This mode is applicable to remotely configure a router, query logs and alarms, and locate faults through a PSTN when a network connection is broken. 14

16 To ensure a successful remote login to a router through the AUX port, perform necessary configurations at both the router side and administrator side. Table 5 Requirements on remote login through AUX port by using modem Router Requirement The PC is correctly connected to the modem. Administrator side The modem is connected to a telephone cable that works normally. The telephone number of the modem connected to the AUX port of the remote router is obtained. The AUX port is correctly connected to the modem. Configurations have been made on the modem. Router side The modem is connected to a telephone cable that works properly. Authentication modes are configured on the remote router. For more information, see Configuring the authentication mode. Configurations on the administrator side Perform these configurations on the administrator side: 1. Correctly connect the PC and the modem. 2. Connect the modem to a telephone cable in good working condition. 3. Obtain the telephone number on the modem connected to the AUX port of the remote router. Configurations on the router Configuration on the modem that is directly connected to the router Perform the following configurations on the modem that is directly connected to the router (no configuration is needed on the modem connected to the terminal): AT&F Restore the factory defaults ATS0= Configure auto-answer on first ring AT&D Ignore data Terminal Ready signals AT&K Disable local flow control AT&R Ignore Data Flow Control signals AT&S Force DSR to remain on ATEQ1&W Disable the modem from response to commands and save the configuration To verify your configuration, enter AT&V to display the configuration results. NOTE: The configuration commands and the output for different modems may be different. For more information, see the user guide of your modem. Configuration on the router When configuring the router, note the following guidelines: 15

17 The transmission speed on the AUX port is lower than that of the modem. Otherwise, packets may be lost. Other attributes, such as parity check, stop bits, and data bits, of the AUX port are set to the default values. Setting up a configuration environment 1. Before logging in to your router by using modems, perform corresponding configurations on your router. For more information, see Modifying the default settings of the AUX port. 2. Perform the following configurations on the modem that is directly connected to your router: AT&F Factory defaults ATS0= Auto-answer on first ring AT&D Data Terminal Ready AT&K Local flow control AT&R Disables Receive Data Flow Control AT&S DSR action select ATEQ1&W Disables the modem's response to the command and saves the configuration To verify your configuration, execute the AT&V command to display the configuration results. 3. Set up a configuration environment as shown in Figure 16: connect the serial port of the PC and the AUX port of the router to a modem respectively. Figure 16 Setting up a configuration environment Modem serial cable Telephone cable Modem IP network Remote telephone number: On the PC, dial a number of the modem that is connected to the router to establish a connection with the router, as shown in Figure 17 through Figure

18 Figure 17 Connection Description Figure 18 Entering the phone number 17

19 Figure 19 Dialing the number on the remote PC 5. If the authentication mode is password, a prompt (for example, sysname) appears when you enter the configured password on the remote terminal. Then you can configure or manage the router. To get help, enter?. 18

20 Configuring user interfaces User interface overview Brief introduction A user interface, also called line, enables you to manage and monitor sessions between the terminal and the router when you log in to the router through the console port, AUX port, an asynchronous serial interface, or through Telnet or SSH. Asynchronous serial interfaces include the following two types: Synchronous/asynchronous serial interface operating in asynchronous mode, the interface index of which begins with Serial. Dedicated asynchronous serial interface, the interface index of which begins with Async. A single user interface corresponds to a single user interface view where you can configure a set of parameters, such as whether to authenticate users at login, whether to redirect the requests to another device, and the user privilege level after login. When the user logs in through a user interface, the connection follows these parameter settings, implementing centralized management of various sessions. At present, the system supports the following CLI configuration methods: Local configuration via the console port Local or remote configuration via the AUX port (Auxiliary port) Local or remote configuration through Telnet or SSH The CLI configuration methods correspond to the following types of user interfaces: Console user interface Manages and monitors users that log in via the console port. The console port is a line router port. The router provides console ports of EIA/TIA-232 DCE type. AUX user interface Manages and monitors users that log in via the AUX port. The AUX port is also a line router port. The router provides AUX ports of EIA/TIA-232 DTE type. The port is usually used for dialup access via a modem. VTY (virtual type terminal) user interface Manages and monitors users logging in via VTY. A VTY port is a logical terminal line used when you access the router through Telnet or SSH. At present, the router supports at most 16 concurrent VTY users. Users and user interfaces At a time, only one user can use a user interface. The configuration made in a user interface view applies to any user logged in to that user interface. For example, if user A uses the console port to log in, the configuration in the console port user interface view applies to user A. If user A logs in through VTY 1, the configuration in the VTY 1 user interface view applies to user A. A router can support multiple console ports, AUX ports, asynchronous serial interfaces, and Ethernet interfaces or a combination of all of these. Hence, a router supports multiple user interfaces. These user interfaces do not associate with specific users. When a user initiates a connection request, the system 1

21 automatically assigns an idle user interface with the smallest number to the user based on the login method. During login, the configuration in the user interface view takes effect. The user interface varies depending on the login method and login time. Numbering user interfaces User interfaces are numbered in two ways: absolute numbering and relative numbering. Absolute numbering Absolute numbering identifies a user interface or a group of different types of user interfaces. The specified user interfaces are numbered from 0 with a step of 1 in this sequence: console, AUX, and VTY user interfaces. You can use the display user-interface command without any parameters to view supported user interfaces and their absolute numbers. Relative numbering Relative numbering enables you to specify a user interface or a group of user interfaces of a specific type. The number is valid only when used under that type of user interface. It is invalid when used under any other type of user interface. Relative numbering numbers a user interface in the form of user interface type + number. The rules of relative numbering are as follows: Console ports are numbered from 0 in the ascending order, with a step of 1. AUX ports are numbered from 0 in the ascending order, with a step of 1. VTYs are numbered from 0 in the ascending order, with a step of 1. User interface configuration task list Complete these tasks to configure a user interface: Task Configuring asynchronous serial interface attributes Configuring terminal attributes Configuring a command to be automatically executed Configuring user privilege level under a user interface Configuring access control on VTY user interfaces Configuring supported protocols on VTY user interfaces Configuring the authentication mode Configuring command authorization Configuring command accounting Defining shortcut keys for starting terminal sessions/aborting tasks Sending messages to the specified user interfaces Releasing the connection established on user interfaces Remarks Optional Optional Optional Optional Optional Optional Optional Optional Optional Optional Optional Optional 2

22 Configuring asynchronous serial interface attributes A serial interface contains the following key attributes: Transmission rate Number of bits that the router transmits to the terminal per second. It measures the transmission speed. Typically a higher transmission rate is used between closer distances for communication. Data bits Number of bits representing one character. The setting depends on the contexts to be transmitted, For example, you can set it to 7 if standard ASCII characters are to be sent; set it to 8 if extended ASCII characters are to be sent. Parity check An error checking technique to detect whether errors occurred in the data transmission. Stop bits The last bits transmitted in data transmission to unequivocally indicate the end of a character. The more the bits are, the slower the transmission is. These attribute settings must be consistent on two user interfaces for communication. To configure asynchronous attributes of a serial interface: Step Command Remarks 1. Enter system view. system-view N/A 2. Enter user interface view. 3. Configure the transmission rate. 4. Configure the data bits for each character. 5. Configure a parity check method. 6. Configure the number of stop bits transmitted per byte. 7. Configure the flow control mode. user-interface { first-num1 [ last-num1 ] { aux console } first-num2 [ last-num2 ] } speed speed-value databits { } parity { even mark none odd space } stopbits { } flow-control { hardware software none } N/A 9600 bps by default. 8 by default. The router does not support data bits 5 and 6. None by default. 1 by default. By default, the flow control mode is none. The router does not support the hardware and software keywords. Configuring terminal attributes To configure terminal attributes: 3

23 Step Command Remarks 1. Enter system view. system-view N/A 2. Enter user interface view. user-interface { first-num1 [ last-num1 ] { aux console vty } first-num2 [ last-num2 ] } N/A 3. Start the terminal service. shell 4. Set the idle-timeout disconnection function for terminal users. idle-timeout minutes [ seconds ] The terminal service is enabled on all user interfaces by default. 10 minutes by default. 5. Set the number of lines on a screen. 6. Set the display type of the current user terminal. screen-length screen-length terminal type { ansi vt100 } By default, up to 24 lines of data are displayed on a screen. A value of 0 disables pausing between screens of output. ANSI by default. 7. Set the size of the history command buffer of the user interface. history-command size-value max-size The history buffer can store 10 commands by default. 8. Return to user view. return N/A 9. Lock the user interface to prevent unauthorized users from using this interface. lock Disabled by default. NOTE: The system supports two types of terminal display: ANSI and VT100. If the terminal display of the router and the client (for example, hyper terminal or Telnet terminal) is inconsistent or is set to ANSI, and if the total number of the characters of the command line that is being used exceeds 80, anomalies such as cursor corruption or abnormal display of the terminal display may occur on the client. Therefore, you are recommended to set the display type of both the router and the client to VT100. Configuring a command to be automatically executed The system automatically executes a command when a user logs in by using the user interface where the auto-execute command command is configured. The system tears down the user connection after the command completes. If the auto-execution command command triggers another task or connection, the system does not tear down the user connection until the task completes or the triggered connection breaks down. A good example is configuring the auto-execute command telnet command to let users automatically telnet to the specified host. 4

24 To configure auto-execute command: Step Command Remarks 1. Enter system view. system-view N/A 2. Enter user interface view. 3. Configure the command to be automatically executed. user-interface { first-num1 [ last-num1 ] { aux vty } first-num2 [ last-num2 ] } auto-execute command command N/A By default, no command is set to be automatically executed. The auto-execute command command is not supported by the console port, or the AUX port when the router has only one AUX port and no console port. CAUTION: The auto-execute command command may disable you from configuring the system through the user interface to which the command is applied. Therefore, before configuring the command and saving the configuration (by using the save command), make sure that you can access the router by other VTY, console, or AUX user interfaces to remove the configuration in case a problem occurs. Configuring user privilege level under a user interface User privilege levels restrict the access rights of different users to the router. If the authentication mode is scheme when a user logs in, which means username and password are needed, and SSH public key authentication is adopted, the privilege level of the user is the user interface level, which is configured in user interface view. The default user interface level is 0. If the authentication mode is none or password when a user logs in, which means no username is needed, the privilege level of the user is the user interface level. To configure the user privilege level under a user interface: Step Command Remarks 1. Enter system view. system-view N/A 2. Enter user interface view. 3. Configure user s privilege level under the current user interface. user-interface { first-num1 [ last-num1 ] { aux console vty } first-num2 [ last-num2 ] } user privilege level level N/A By default, users logging in through console port have a privilege level of 3; users logging in through other user interfaces have a privilege level of 0. 5

25 NOTE: For more information about user levels, see the chapter Using the CLI. The user privilege level can be configured under a user interface or by setting AAA authentication parameters, and which configuration mode takes effect depends on the authentication mode at user login. For more information, see the chapter Using the CLI. Configuring access control on VTY user interfaces You can configure access control on the VTY user interface by referencing an ACL. For more information about ACL, see ACL and QoS Configuration Guide. To control access to VTY user interfaces: Step Command Remarks 1. Enter system view. system-view N/A 2. Enter VTY user interface view. 3. Control access to the VTY user interface. user-interface { first-num1 [ last-num1 ] vty first-num2 [ last-num2 ] } Reference a basic/advanced ACL: acl [ ipv6 ] acl-number { inbound outbound } Reference a WLAN/Ethernet frame header ACL: acl acl-number inbound N/A Use either command. No access control is set by default. Configuring supported protocols on VTY user interfaces To configure supported protocols on the active VTY user interface: Step Command Remarks 1. Enter system view. system-view N/A 2. Enter VTY user interface view. 3. Configure the supported protocols on the current user interface. user-interface { first-num1 [ last-num1 ] vty first-num2 [ last-num2 ] } protocol inbound { all pad ssh telnet } N/A Support for the pad keyword depends on the router model. By default, both Telnet and SSH are supported. 6

26 CAUTION: If SSH is configured, you must set the authentication mode to scheme by using the authentication-mode scheme command to guarantee a successful login. The protocol inbound ssh command fails if the authentication mode is password or none. The protocols configured through the protocol inbound command take effect next time you log in through that user interface. Configuring the authentication mode Authentication mode under a user interface determines whether to authenticate users that are logging in through the user interface. The method enhances the security of the router. The router supports authentication modes of none, password, and scheme. none Requires no username and password when users log in through the specified user interface. This mode is insecure. password Requires password authentication on users that are logging in through the user interface. Always set the password for this mode before terminating your current connection. Next time when a user attempts to use the user interface to log in, an empty or wrong password fails the login. If no authentication password is set for this mode on the AUX or VTY user interface, no user can log in, and the system displays "Login password has not been set!" If no password is set on the console user interface, login without a password is allowed. scheme Requires username and password authentication on users that are logging in through the user interface. Always set the username and password for this mode before terminating your current connection. Next time when a user attempts to use the user interface to log in, an empty or wrong username or password fails the login. User authentication falls into local authentication and remote authentication. If local authentication is adopted, configure a local user and the related parameters as shown in the table for configuring authentication mode as scheme. If remote authentication is adopted, configure username and password on the remote authentication server. For more information about the user authentication modes and parameters, see Security Configuration Guide. By default, the router performs local authentication on users. If you log in to the router through SSH, the rules apply to password authentication only. For more information about SSH, see Security Configuration Guide. To configure the authentication mode as none: Step Command Remarks 1. Enter system view. system-view N/A 2. Enter user interface view. 3. Configure not to authenticate users that are logging in through the current user interface. user-interface { first-num1 [ last-num1 ] { aux console vty } first-num2 [ last-num2 ] } authentication-mode none N/A By default, password is for VTY and AUX logins, and none is for console logins. To configure the authentication mode as password: 7

27 Step Command Remarks 1. Enter system view. system-view N/A 2. Enter user interface view. 3. Configure to perform password authentication on users that are logging in through the current user interface. 4. Set the local authentication password. user-interface { first-num1 [ last-num1 ] { aux console vty } first-num2 [ last-num2 ] } authentication-mode password set authentication password { cipher simple } password N/A By default, password is for VTY and AUX logins, and none is for console logins. No local authentication password is set by default. To configure the authentication mode as scheme (local authentication): Step Command Remarks 1. Enter system view. system-view N/A 2. Enter user interface view. 3. Configure to perform AAA authentication on users that are logging in through the current user interface. user-interface { first-num1 [ last-num1 ] { aux console vty } first-num2 [ last-num2 ] } authentication-mode scheme N/A By default, password is for VTY and AUX logins, and none is for console logins. 4. Set the user privilege level. See Configuring user privilege level under a user interface. By default, users logging in through the console port have a privilege level of 3; users logging in through other user interfaces have a privilege level of Return to system view. quit N/A 6. Set the authentication username and enter local user view. 7. Set the authentication password. 8. Set the service type that can be used by users. 9. Configure user attributes. local-user user-name password { cipher simple } password service-type { ssh telnet terminal } * authorization-attribute { acl acl-number callback-number callback-number idle-cut minute level level user-profile profile-name vlan vlan-id work-directory directory-name } * No local user is set on the router by default. N/A Users logging in via VTY user interface use telnet or ssh service. Users logging in via console or AUX port use terminal service. By default, FTP/SFTP users can access the router's root directory with the user level 0. 8

28 NOTE: For more information about the local-user, password, service-type, and authorization-attribute commands, see Security Command Reference. Configuring command authorization By default, command level for a login user depends on the user level. The user is authorized to execute commands whose default level is not higher than the user level. If you configure command authorization, the command level for a login user is determined by both the user level and AAA authorization. If a user executes a command of the corresponding user level, the authorization server checks whether the command is authorized. If yes, the command can be executed. To configure command authorization, you must: 1. Configure the authentication mode as scheme, which requires both the username and password for login authentication. 2. Enable command authorization. 3. Configure an HWTACACS scheme. Specify the IP addresses of the HWTACACS authorization servers and other related parameters. 4. Configure the ISP domain to use the HWTACACS scheme for command line users. For more information about HWTACACS configuration, see Security Configuration Guide. To enable command authorization: Step Command Remarks 1. Enter system view. system-view N/A 2. Enter user interface view. 3. Enable command authorization. user-interface { first-num1 [ last-num1 ] { aux console vty } first-num2 [ last-num2 ] } command authorization N/A By default, command authorization is disabled, and users can execute commands without authorization. Configuring command accounting Command accounting allows the HWTACACS server to record all executed commands that are supported by the router, regardless of the command execution result. This helps control and monitor user operations on the router. If command accounting is enabled and command authorization is not enabled, every executed command is recorded on the HWTACACS server. If both command accounting and command authorization are enabled, only the authorized and executed commands are recorded on the HWTACACS server. To configure command accounting, you must: 1. Enable command accounting. 2. Configure an HWTACACS scheme. Specify the IP addresses of the HWTACACS accounting servers and other related parameters. 9

29 3. Configure the ISP domain to use the HWTACACS scheme for command line users. For more information about HWTACACS configurations, see Security Configuration Guide. To enable command accounting: Step Command Remarks 1. Enter system view. system-view N/A 2. Enter user interface view. user-interface { first-num1 [ last-num1 ] { aux console vty } first-num2 [ last-num2 ] } N/A 3. Enable command accounting. command accounting By default, command accounting is disabled, and the accounting server does not record the commands the users execute. Defining shortcut keys for starting terminal sessions/aborting tasks To define shortcut keys for starting terminal sessions/aborting tasks: Step Command Remarks 1. Enter system view. system-view N/A 2. Enter user interface view. 3. Define a shortcut key for starting a terminal session. 4. Define a shortcut key for aborting a task. user-interface { first-num1 [ last-num1 ] { aux console vty } first-num2 [ last-num2 ] } activation-key character escape-key { default character } N/A Pressing Enter starts the terminal session by default. By default, the escape key sequence Ctrl+C is to abort a task. NOTE: The activation-key command is not supported on the VTY user interface. Sending messages to the specified user interfaces To send messages to the specified user interfaces: Task Command Remarks Send messages to the specified user interfaces. send { all num1 { aux console vty } num2 } Available in user view 10

30 Releasing the connection established on user interfaces Multiple users can log in to the system to simultaneously configure the router. In some circumstances, when the administrator wants to make configurations without interruption from the users that have logged in through other user interfaces, the administrator can execute the following commands to release the connection established on the specified user interfaces. To release the connection established on the user interfaces: Task Command Remarks Release the connection established on the specified user interfaces. free user-interface { num1 { aux console vty } num2 } Available in user view NOTE: You cannot use this command to release the connection that you are using. Displaying and maintaining user interfaces Task Command Remarks Display the Telnet configuration when the router serves as a Telnet client. Display information about all the user interfaces supported on the router. Display information about the specified or all user interfaces. display telnet client configuration [ { begin exclude include } regular-expression ] display users [ all ] [ { begin exclude include } regular-expression ] display user-interface [ num1 { aux console vty } num2 ] [ summary ] [ { begin exclude include } regular-expression ] Available in any view Available in any view Available in any view User interface configuration examples User authentication configuration example Network requirements As shown in Figure 20, three administrators need to access Device for device management: one through a console port, one through an IP network, and one through a public switched telephone network (PSTN). Configure Device to: Perform no authentication for users who log in through the console port. Perform password authentication for users who log in through the IP network. 11

31 Use the RADIUS server to authenticate users who log in through the PSTN, and use local authentication as the backup. Assign different command levels to different types of users. Figure 20 Network diagram Configuration procedure # Assign IP addresses to the interfaces on Device so that Device and Host B can reach each other and Device and the RADIUS server can reach each other. (Details not shown) # Enable the Telnet service on Device. <Sysname> system-view [Sysname] telnet server enable # Configure Device to perform no authentication for users logging in through the console port and to allow the users to use commands of privilege level 3 (all commands). [Sysname] user-interface console 0 [Sysname-ui-console0] authentication-mode none [Sysname-ui-console0] user privilege level 3 [Sysname-ui-console0] quit # Configure Device to perform password authentication for users logging in to VTY user interfaces 0 through 4. Set the password to 123, and set the privilege level of the users to 2. [Sysname] user-interface vty 0 4 [Sysname-ui-vty0-4] authentication-mode password [Sysname-ui-vty0-4] set authentication password cipher 123 [Sysname-ui-vty0-4] user privilege level 2 [Sysname-ui-vty0-4] quit # Configure Device to use AAA to authenticate users logging in to user interface VTY 5. [Sysname] user-interface vty 5 [Sysname-ui-vty5] authentication-mode scheme [Sysname-ui-vty5] quit 12

32 # Create a RADIUS scheme and configure the IP address and UDP port for the primary authentication server for the scheme. Make sure that the port number is consistent with that on the RADIUS server. Set the shared key for authentication packets to expert for the scheme and the RADIUS server type of the scheme to extended. Configure Device to remove the domain name in the username sent to the RADIUS server. [Sysname] radius scheme rad [Sysname-radius-rad] primary authentication [Sysname-radius-rad] key authentication expert [Sysname-radius-rad] server-type extended [Sysname-radius-rad] user-name-format without-domain [Sysname-radius-rad] quit # Configure the default ISP domain system to use RADIUS scheme rad for login users and use local authentication as the backup. [Sysname] domain system [Sysname-isp-system] authentication login radius-scheme rad local [Sysname-isp-system] authorization login radius-scheme rad local [Sysname-isp-system] quit # Add a local user named monitor, set the user password to 123, and specify to display the password in cipher text. Authorize user monitor to use the Telnet service and specify the level of the user as 1, the monitor level. [Sysname] local-user monitor [Sysname-luser-admin] password cipher 123 [Sysname-luser-admin] service-type telnet [Sysname-luser-admin] authorization-attribute level 1 Command authorization configuration example Network requirements As shown in Figure 21, configure Device to use the HWTACACS server to authenticate and perform command line authorization for users accessing the VTY interfaces 0 through 4, and use local authentication and authorization as the backup. Figure 21 Network diagram HWTACACS server /24 IP network Device Host A Configuration procedure # Assign an IP address to Device so that Device and Host A, and Device and the HWTACACS server can reach each other. (Details not shown) # Enable the Telnet service on Device. <Sysname> system-view 13

Logging in through SNMP from an NMS 22 Overview 22 Configuring SNMP agent 22 NMS login example 24

Logging in through SNMP from an NMS 22 Overview 22 Configuring SNMP agent 22 NMS login example 24 Contents Logging in to the CLI 1 Login methods 1 Logging in through the console or AUX port 2 Introduction 2 Configuration procedure 2 Logging in through Telnet 6 Introduction 6 Logging in to the switch

More information

User authentication configuration example 11 Command authorization configuration example 13 Command accounting configuration example 14

User authentication configuration example 11 Command authorization configuration example 13 Command accounting configuration example 14 Contents Logging in to the CLI 1 Login methods 1 Logging in through the console or AUX port 2 Logging in through Telnet 5 Telnetting to the switch 5 Telnetting from the switch to another device 7 Logging

More information

Login management commands

Login management commands Contents Login management commands 1 CLI login configuration commands 1 display telnet client configuration 1 telnet 1 telnet ipv6 2 telnet server enable 3 User interface configuration commands 3 acl (user

More information

Operation Manual Login and User Interface. Table of Contents

Operation Manual Login and User Interface. Table of Contents Table of Contents Table of Contents Chapter 1 Switch Login... 1-1 1.1 Setting Up Configuration Environment Through the Console Port... 1-1 1.2 Setting Up Configuration Environment Through Telnet... 1-2

More information

HP Load Balancing Module

HP Load Balancing Module HP Load Balancing Module System Management Configuration Guide Part number: 5998-4216 Software version: Feature 3221 Document version: 6PW100-20130326 Legal and notice information Copyright 2013 Hewlett-Packard

More information

Table of Contents 1 Commands for Access Controller Switch Interface Board 1-1

Table of Contents 1 Commands for Access Controller Switch Interface Board 1-1 Table of Contents 1 Commands for Access Controller Switch Interface Board 1-1 Commands for Access Controller and Access Controller Switch Interface Board 1-1 acl (user interface view) 1-1 activation-key

More information

HP High-End Firewalls

HP High-End Firewalls HP High-End Firewalls Getting Started Guide Part number: 5998-2646 Software version: F1000-A-EI&F1000-S-EI: R3721 F5000: F3210 F1000-E: F3171 Firewall module: F3171 Document version: 6PW101-20120719 Legal

More information

Contents. Configuring SSH 1

Contents. Configuring SSH 1 Contents Configuring SSH 1 Overview 1 How SSH works 1 SSH authentication methods 2 SSH support for Suite B 3 FIPS compliance 3 Configuring the device as an SSH server 4 SSH server configuration task list

More information

Table of Contents 1 SSH Configuration 1-1

Table of Contents 1 SSH Configuration 1-1 Table of Contents 1 SSH Configuration 1-1 SSH Overview 1-1 Introduction to SSH 1-1 Algorithm and Key 1-1 Asymmetric Key Algorithm 1-2 SSH Operating Process 1-2 Configuring the SSH Server 1-4 SSH Server

More information

Operation Manual AAA RADIUS HWTACACS H3C S5500-EI Series Ethernet Switches. Table of Contents

Operation Manual AAA RADIUS HWTACACS H3C S5500-EI Series Ethernet Switches. Table of Contents Table of Contents Table of Contents... 1-1 1.1 AAA/RADIUS/HWTACACS Over... 1-1 1.1.1 Introduction to AAA... 1-1 1.1.2 Introduction to RADIUS... 1-3 1.1.3 Introduction to HWTACACS... 1-9 1.1.4 Protocols

More information

HP A3100 v2 Switch Series

HP A3100 v2 Switch Series HP A3100 v2 Switch Series Fundamentals Command Reference HP A3100-8 v2 SI Switch (JG221A) HP A3100-16 v2 SI Switch (JG222A) HP A3100-24 v2 SI Switch (JG223A) HP A3100-8 v2 EI Switch (JD318B) HP A3100-16

More information

Table of Contents 1 FTP and SFTP Configuration TFTP Configuration 2-1

Table of Contents 1 FTP and SFTP Configuration TFTP Configuration 2-1 Table of Contents 1 FTP and SFTP Configuration 1-1 Introduction to FTP and SFTP 1-1 Introduction to FTP 1-1 Introduction to SFTP 1-1 FTP Configuration 1-2 FTP Configuration: A Switch Operating as an FTP

More information

HP 3600 v2 Switch Series

HP 3600 v2 Switch Series HP 3600 v2 Switch Series Fundamentals Command Reference Part number: 5998-2359 Software version: Release 2101 Document version: 6W101-20130930 Legal and notice information Copyright 2013 Hewlett-Packard

More information

HP 3600 v2 Switch Series

HP 3600 v2 Switch Series HP 3600 v2 Switch Series Fundamentals Command Reference Part number: 5998-7608 Software version: Release 2110P02 Document version: 6W100-20150305 Legal and notice information Copyright 2015 Hewlett-Packard

More information

H3C WA Series WLAN Access Points. Fundamentals Command Reference

H3C WA Series WLAN Access Points. Fundamentals Command Reference H3C WA Series WLAN Access Points Fundamentals Command Reference Abstract This document details the commands for the WA series WLAN access points. Intended audience includes network planners, field technical

More information

Table of Contents 1 AAA Overview AAA Configuration 2-1

Table of Contents 1 AAA Overview AAA Configuration 2-1 Table of Contents 1 AAA Overview 1-1 Introduction to AAA 1-1 Authentication 1-1 Authorization 1-1 Accounting 1-2 Introduction to ISP Domain 1-2 Introduction to AAA Services 1-3 Introduction to RADIUS 1-3

More information

Operation Manual SSH H3C S3610&S5510 Series Ethernet Switches. Table of Contents

Operation Manual SSH H3C S3610&S5510 Series Ethernet Switches. Table of Contents Table of Contents Table of Contents... 1-1 1.1 SSH Overview... 1-1 1.2 Configuring the SSH Server... 1-5 1.2.1 Enabling SSH Server... 1-5 1.2.2 Configuring the Protocols for the SSH Client User Interface

More information

Table of Contents 1 AAA Overview AAA Configuration 2-1

Table of Contents 1 AAA Overview AAA Configuration 2-1 Table of Contents 1 AAA Overview 1-1 Introduction to AAA 1-1 Authentication 1-1 Authorization 1-1 Accounting 1-2 Introduction to ISP Domain 1-2 Introduction to AAA Services 1-2 Introduction to RADIUS 1-2

More information

Using Cisco IOS XE Software

Using Cisco IOS XE Software This chapter describes the basics of using the Cisco IOS XE software and includes the following section: Accessing the CLI Using a Router Console, on page 1 Accessing the CLI Using a Router Console Before

More information

Part number: Published: March Com Switch 4500 Family Configuration Guide

Part number: Published: March Com Switch 4500 Family Configuration Guide http://www.3com.com/ Part number: 10015003 Published: March 2006 3Com Switch 4500 Family Configuration Guide 3Com Corporation 350 Campus Drive Marlborough, MA USA 01752-3064 Copyright 2006, 3Com Corporation.

More information

Configuring the Management Interface and Security

Configuring the Management Interface and Security CHAPTER 5 Configuring the Management Interface and Security Revised: February 15, 2011, Introduction This module describes how to configure the physical management interfaces (ports) as well as the various

More information

Table of Contents 1 CLI Configuration 1-1

Table of Contents 1 CLI Configuration 1-1 Table of Contents 1 CLI Configuration 1-1 Introduction to the CLI 1-1 Command Hierarchy 1-1 Switching User Levels 1-2 Setting the Level of a Command in a Specific View 1-3 CLI Views 1-4 CLI Features 1-6

More information

Cisco - Connecting Routers Back-to-Back Through the AUX Ports using a Rollover Cable

Cisco - Connecting Routers Back-to-Back Through the AUX Ports using a Rollover Cable 1 of 5 6/12/2001 1:43 PM Connecting Routers Back-to-Back Through the AUX Ports using a Rollover Cable Contents Introduction Conventions Network Diagram Configurations Troubleshooting the Configuration

More information

Privilege Level Switching Authentication Technology White Paper

Privilege Level Switching Authentication Technology White Paper Privilege Level Switching Authentication Technology White Paper Keywords: Privilege level switching authentication, RADIUS, HWTACACS Abstract: This document briefly describes the background and implementation

More information

Examples of Cisco APE Scenarios

Examples of Cisco APE Scenarios CHAPTER 5 This chapter describes three example scenarios with which to use Cisco APE: Access to Asynchronous Lines, page 5-1 Cisco IOS Shell, page 5-3 Command Authorization, page 5-5 Note For intructions

More information

H3C S5830V2 & S5820V2 Switch Series

H3C S5830V2 & S5820V2 Switch Series H3C S5830V2 & S5820V2 Switch Series Security Command Reference Hangzhou H3C Technologies Co., Ltd. http://www.h3c.com Software version: Release2108 Document version: 6W101-20120531 Copyright 2012, Hangzhou

More information

Operation Manual Security. Table of Contents

Operation Manual Security. Table of Contents Table of Contents Table of Contents Chapter 1 802.1x Configuration... 1-1 1.1 802.1x Overview... 1-1 1.1.1 802.1x Standard Overview... 1-1 1.1.2 802.1x System Architecture... 1-1 1.1.3 802.1x Authentication

More information

Configuring a Terminal/Comm Server

Configuring a Terminal/Comm Server Configuring a Terminal/Comm Server Document ID: 5466 Introduction Prerequisites Requirements Components Used Conventions Cabling Design Strategy Configure Network Diagram Configurations Command Summary

More information

HP MSR Router Series. Terminal Access Configuration Guide(V5) Part number: Software version: CMW520-R2509 Document version: 6PW

HP MSR Router Series. Terminal Access Configuration Guide(V5) Part number: Software version: CMW520-R2509 Document version: 6PW HP MSR Router Series Terminal Access Configuration Guide(V5) Part number: 5998-2022 Software version: CMW520-R2509 Document version: 6PW102-20130925 Legal and notice information Copyright 2013 Hewlett-Packard

More information

HP A5830 Switch Series Fundamentals. Configuration Guide. Abstract

HP A5830 Switch Series Fundamentals. Configuration Guide. Abstract HP A5830 Switch Series Fundamentals Configuration Guide Abstract This document describes the software features for the HP A Series products and guides you through the software configuration procedures.

More information

H3C S12500 Series Routing Switches

H3C S12500 Series Routing Switches H3C S12500 Series Routing Switches Security Command Reference Hangzhou H3C Technologies Co., Ltd. http://www.h3c.com Software version: S12500-CMW710-R7128 Document version: 6W710-20121130 Copyright 2012,

More information

Operation Manual 802.1x. Table of Contents

Operation Manual 802.1x. Table of Contents Table of Contents Table of Contents... 1-1 1.1 802.1x Overview... 1-1 1.1.1 Architecture of 802.1x... 1-1 1.1.2 Operation of 802.1x... 1-3 1.1.3 EAP Encapsulation over LANs... 1-4 1.1.4 EAP Encapsulation

More information

HP Load Balancing Module

HP Load Balancing Module HP Load Balancing Module System Maintenance Configuration Guide Part number: 5998-4221 Software version: Feature 3221 Document version: 6PW100-20130326 Legal and notice information Copyright 2013 Hewlett-Packard

More information

Table of Contents. 4 System Guard Configuration 4-1 System Guard Overview 4-1 Guard Against IP Attacks 4-1 Guard Against TCN Attacks 4-1

Table of Contents. 4 System Guard Configuration 4-1 System Guard Overview 4-1 Guard Against IP Attacks 4-1 Guard Against TCN Attacks 4-1 Table of Contents 1 802.1x Configuration 1-1 Introduction to 802.1x 1-1 Architecture of 802.1x Authentication 1-1 The Mechanism of an 802.1x Authentication System 1-3 Encapsulation of EAPoL Messages 1-3

More information

HPE FlexFabric 5700 Switch Series

HPE FlexFabric 5700 Switch Series HPE FlexFabric 5700 Switch Series Fundamentals Command Reference Part number: 5998-5600R Software version: Release 2422P01 and later Document version: 6W100-20160331 Copyright 2016 Hewlett Packard Enterprise

More information

RADIUS Configuration. Overview. Introduction to RADIUS. Client/Server Model

RADIUS Configuration. Overview. Introduction to RADIUS. Client/Server Model Table of Contents RADIUS Configuration 1 Overview 1 Introduction to RADIUS 1 Client/Server Model 1 Security and Authentication Mechanisms 2 Basic Message Exchange Process of RADIUS 2 RADIUS Packet Format

More information

Configuring Basic AAA on an Access Server

Configuring Basic AAA on an Access Server Configuring Basic AAA on an Access Server Document ID: 10384 Contents Introduction Before You Begin Conventions Prerequisites Components Used Network Diagram General AAA Configuration Enabling AAA Specifying

More information

Part number: DUA1756-1BAA01 Published: September 2005 SuperStack 3 Switch 4500 Family Configuration Guide

Part number: DUA1756-1BAA01 Published: September 2005 SuperStack 3 Switch 4500 Family Configuration Guide http://www.3com.com/ Part number: DUA1756-1BAA01 Published: September 2005 SuperStack 3 Switch 4500 Family Configuration Guide 3Com Corporation 350 Campus Drive Marlborough, MA USA 01752-3064 Copyright

More information

HP 5920 & 5900 Switch Series

HP 5920 & 5900 Switch Series HP 5920 & 5900 Switch Series Security Command Reference Part number: 5998-2887 Software version: Release2208 Document version: 6W100-20130228 Legal and notice information Copyright 2013 Hewlett-Packard

More information

Console Port, Telnet, and SSH Handling

Console Port, Telnet, and SSH Handling Console Port Overview, on page 1 Connecting Console Cables, on page 1 Installing USB Device Drivers, on page 1 Console Port Handling Overview, on page 2 Telnet and SSH Overview, on page 2 Persistent Telnet,

More information

Lab Using the CLI to Gather Network Device Information Topology

Lab Using the CLI to Gather Network Device Information Topology Topology Addressing Table Objectives Device Interface IP Address Subnet Mask Default Gateway R1 G0/1 192.168.1.1 255.255.255.0 N/A Lo0 209.165.200.225 255.255.255.224 N/A S1 VLAN 1 192.168.1.11 255.255.255.0

More information

ZyWALL 70. Internet Security Appliance. Quick Start Guide Version 3.62 December 2003

ZyWALL 70. Internet Security Appliance. Quick Start Guide Version 3.62 December 2003 ZyWALL 70 Internet Security Appliance Quick Start Guide Version 3.62 December 2003 Introducing the ZyWALL The ZyWALL 70 is the ideal secure gateway for all data passing between the Internet and the LAN.

More information

HP 5920 & 5900 Switch Series

HP 5920 & 5900 Switch Series HP 5920 & 5900 Switch Series Fundamentals Configuration Guide Part number: 5998-2891 Software version: Release 2210 Document version: 6W100-20131105 Legal and notice information Copyright 2013 Hewlett-Packard

More information

DGS-1510 Series Gigabit Ethernet SmartPro Switch Web UI Reference Guide. Figure 9-1 Port Security Global Settings window

DGS-1510 Series Gigabit Ethernet SmartPro Switch Web UI Reference Guide. Figure 9-1 Port Security Global Settings window 9. Security DGS-1510 Series Gigabit Ethernet SmartPro Switch Web UI Reference Guide Port Security 802.1X AAA RADIUS TACACS IMPB DHCP Server Screening ARP Spoofing Prevention MAC Authentication Web-based

More information

Configuring Secure Shell (SSH)

Configuring Secure Shell (SSH) Prerequisites for Configuring Secure Shell, page 1 Restrictions for Configuring Secure Shell, page 2 Information About Configuring Secure Shell, page 2 How to Configure Secure Shell, page 4 Monitoring

More information

HP 5120 SI Switch Series

HP 5120 SI Switch Series HP 5120 SI Switch Series Security Configuration Guide Part number: 5998-1815 Software version: Release 1505 Document version: 6W102-20121111 Legal and notice information Copyright 2012 Hewlett-Packard

More information

L2TP Configuration. L2TP Overview. Introduction. Typical L2TP Networking Application

L2TP Configuration. L2TP Overview. Introduction. Typical L2TP Networking Application Table of Contents L2TP Configuration 1 L2TP Overview 1 Introduction 1 Typical L2TP Networking Application 1 Basic Concepts of L2TP 2 L2TP Tunneling Modes and Tunnel Establishment Process 4 L2TP Features

More information

Configuring Terminal Settings and Sessions

Configuring Terminal Settings and Sessions This chapter contains the following sections: Information About Terminal Settings and Sessions, page 1 Configuring the Console Port, page 3 Configuring the COM1 Port, page 5 Configuring Virtual Terminals,

More information

Configuring Security with Passwords, Privileges, and Logins

Configuring Security with Passwords, Privileges, and Logins Configuring Security with Passwords, Privileges, and Logins Cisco IOS based networking devices provide several features that can be used to implement basic security for CLI sessions using only the operating

More information

HWTACACS Technology White Paper

HWTACACS Technology White Paper S Series Switches HWTACACS Technology White Paper Issue 1.0 Date 2015-08-08 HUAWEI TECHNOLOGIES CO., LTD. 2015. All rights reserved. No part of this document may be reproduced or transmitted in any form

More information

SSH Configuration Examples H3C S7500 Series Ethernet Switches Release Table of Contents

SSH Configuration Examples H3C S7500 Series Ethernet Switches Release Table of Contents Table of Contents Table of Contents Chapter 1 SSH Overview... 1-1 1.1 Introduction to SSH... 1-1 1.2 Support for SSH Functions... 1-1 1.3 SSH Configuration... 1-1 1.3.1 Configuring an SSH Server... 1-1

More information

Using the Command-Line Interface

Using the Command-Line Interface CHAPTER 2 This chapter describes the Cisco IOS command-line interface (CLI) and how to use it to configure your Cisco ME 3400 Ethernet Access switch. It contains these sections: Understanding Command Modes,

More information

SSH H3C Low-End Ethernet Switches Configuration Examples. Table of Contents

SSH H3C Low-End Ethernet Switches Configuration Examples. Table of Contents Table of Contents Table of Contents Chapter 1 Overview... 1-1 1.1 Introduction to... 1-1 1.2 Support for Functions... 1-1 1.3 Configuration... 1-2 1.3.1 Configuring an Server... 1-2 1.3.2 Configuring an

More information

Lab Configuring Switch Security Features Topology

Lab Configuring Switch Security Features Topology Topology Addressing Table Objectives Device Interface IP Address Subnet Mask Default Gateway R1 G0/1 172.16.99.1 255.255.255.0 N/A S1 VLAN 99 172.16.99.11 255.255.255.0 172.16.99.1 PC-A NIC 172.16.99.3

More information

Configuring Management Access

Configuring Management Access 37 CHAPTER This chapter describes how to access the ASA for system management through Telnet, SSH, and HTTPS (using ASDM), how to authenticate and authorize users, how to create login banners, and how

More information

Passwords and Privileges Commands

Passwords and Privileges Commands Passwords and Privileges Commands This chapter describes the commands used to establish password protection and configure privilege levels. Password protection lets you restrict access to a network or

More information

Implementing Secure Shell

Implementing Secure Shell Implementing Secure Shell Secure Shell (SSH) is an application and a protocol that provides a secure replacement to the Berkeley r-tools. The protocol secures sessions using standard cryptographic mechanisms,

More information

CHAPTER 2 ACTIVITY

CHAPTER 2 ACTIVITY CHAPTER 2 ACTIVITY 2.1.1.1 1. CLI stands for 2. GUI stands for 3. Write the step you used to go to CLI interface on Windows 4. The OS, normally loads from a disk drive, into RAM. 5. The portion of the

More information

HP A5820X & A5800 Switch Series Security. Configuration Guide. Abstract

HP A5820X & A5800 Switch Series Security. Configuration Guide. Abstract HP A5820X & A5800 Switch Series Security Configuration Guide Abstract This document describes the software features for the HP A Series products and guides you through the software configuration procedures.

More information

Lab Configuring and Verifying Standard IPv4 ACLs (Instructor Version Optional Lab)

Lab Configuring and Verifying Standard IPv4 ACLs (Instructor Version Optional Lab) (Instructor Version Optional Lab) Instructor Note: Red font color or gray highlights indicate text that appears in the instructor copy only. Optional activities are designed to enhance understanding and/or

More information

Configuring Security for the ML-Series Card

Configuring Security for the ML-Series Card 19 CHAPTER Configuring Security for the ML-Series Card This chapter describes the security features of the ML-Series card. This chapter includes the following major sections: Understanding Security, page

More information

Lab Configuring and Verifying Extended ACLs Topology

Lab Configuring and Verifying Extended ACLs Topology Topology 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 8 Addressing Table Objectives Device Interface IP Address Subnet Mask Default Gateway R1 G0/1 192.168.10.1

More information

Lab - Configuring a Switch Management Address

Lab - Configuring a Switch Management Address Topology Addressing Table Objectives Device Interface IP Address Subnet Mask Default Gateway S1 VLAN 1 192.168.1.2 255.255.255.0 N/A PC-A NIC 192.168.1.10 255.255.255.0 N/A Part 1: Configure a Basic Network

More information

Cisco ISE Command-Line Interface

Cisco ISE Command-Line Interface This chapter provides information on the Cisco Identity Services Engine (Cisco ISE) command-line interface (CLI) that you can use to configure and maintain Cisco ISE. Cisco ISE Administration and Configuration

More information

Using the Command-Line Interface

Using the Command-Line Interface Information About, page 1 How to Use the CLI to Configure Features, page 5 Information About Command Modes The Cisco IOS user interface is divided into many different modes. The commands available to you

More information

HP High-End Firewalls

HP High-End Firewalls HP High-End Firewalls Access Control Configuration Guide Part number: 5998-2648 Software version: F1000-A-EI&F1000-S-EI: R3721 F5000: F3210 F1000-E: F3171 Firewall module: F3171 Document version: 6PW101-20120719

More information

ZyWALL 10W. Internet Security Gateway. Quick Start Guide Version 3.62 December 2003

ZyWALL 10W. Internet Security Gateway. Quick Start Guide Version 3.62 December 2003 Internet Security Gateway Quick Start Guide Version 3.62 December 2003 Introducing the ZyWALL The is the ideal secure gateway for all data passing between the Internet and the LAN. By integrating NAT,

More information

HP Unified Wired-WLAN Products

HP Unified Wired-WLAN Products HP Unified Wired-WLAN Products Security Command Reference HP 830 Unified Wired-WLAN PoE+ Switch Series HP 850 Unified Wired-WLAN Appliance HP 870 Unified Wired-WLAN Appliance HP 11900/10500/7500 20G Unified

More information

Configuring Authorization

Configuring Authorization Configuring Authorization AAA authorization enables you to limit the services available to a user. When AAA authorization is enabled, the network access server uses information retrieved from the user

More information

Table of Contents. 2 MIB Style Configuration 2-1 Setting the MIB Style 2-1 Displaying and Maintaining MIB 2-1

Table of Contents. 2 MIB Style Configuration 2-1 Setting the MIB Style 2-1 Displaying and Maintaining MIB 2-1 Table of Contents 1 SNMP Configuration 1-1 SNMP Overview 1-1 SNMP Mechanism 1-1 SNMP Protocol Version 1-2 MIB Overview 1-2 SNMP Configuration 1-3 Configuring SNMP Logging 1-5 Introduction to SNMP Logging

More information

How to configure MB5000 Serial Port Bridge mode

How to configure MB5000 Serial Port Bridge mode How to configure MB5000 Serial Port Bridge mode MB5000 has a configurable serial port. With this serial port, MB5000 can be used as DCE device to be connected with Cisco router s console port so that MB5000

More information

Lab Configuring and Verifying Standard IPv4 ACLs Topology

Lab Configuring and Verifying Standard IPv4 ACLs Topology Topology 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 10 Addressing Table Objectives Device Interface IP Address Subnet Mask Default Gateway R1 G0/1 192.168.10.1

More information

Configuring Switch-Based Authentication

Configuring Switch-Based Authentication CHAPTER 7 This chapter describes how to configure switch-based authentication on the switch. Unless otherwise noted, the term switch refers to a standalone switch and to a switch stack. This chapter consists

More information

Configuring Lock-and-Key Security (Dynamic Access Lists)

Configuring Lock-and-Key Security (Dynamic Access Lists) Configuring Lock-and-Key Security (Dynamic Access Lists) Feature History Release Modification Cisco IOS For information about feature support in Cisco IOS software, use Cisco Feature Navigator. This chapter

More information

Table of Contents 1 Basic Configuration Commands 1-1

Table of Contents 1 Basic Configuration Commands 1-1 Table of Contents 1 Basic Configuration Commands 1-1 Basic Configuration Commands 1-1 clock datetime 1-1 clock summer-time one-off 1-2 clock summer-time repeating 1-3 clock timezone 1-4 configure-user

More information

Configuration - Security

Configuration - Security Release: Document Revision: 5.3 01.01 www.nortel.com NN46240-600 324564-A Rev01 Release: 5.3 Publication: NN46240-600 Document Revision: 01.01 Document status: Standard Document release date: 30 March

More information

Cisco IOS Firewall Authentication Proxy

Cisco IOS Firewall Authentication Proxy Cisco IOS Firewall Authentication Proxy This feature module describes the Cisco IOS Firewall Authentication Proxy feature. It includes information on the benefits of the feature, supported platforms, configuration

More information

FSOS Getting Started Operation

FSOS Getting Started Operation FSOS Getting Started Operation Contents Contents...2 Chapter 1 Logging in Ethernet Switch...3 1.1 Set up Configuration Environment via Console Port...3 1.2 Set up Configuration Environment through Telnet...

More information

HP 6125 Blade Switch Series

HP 6125 Blade Switch Series HP 6125 Blade Switch Series Fundamentals Configuration Guide Part number: 5998-3153 Software version: Release 2103 Document version: 6W100-20120907 Legal and notice information Copyright 2012 Hewlett-Packard

More information

Configuring IDS TCP Reset Using VMS IDS MC

Configuring IDS TCP Reset Using VMS IDS MC Configuring IDS TCP Reset Using VMS IDS MC Document ID: 47560 Contents Introduction Prerequisites Requirements Components Used Conventions Configure Network Diagram Configurations Initial Sensor Configuration

More information

CCNA Semester 2 labs. Labs for chapters 2 10

CCNA Semester 2 labs. Labs for chapters 2 10 CCNA Semester 2 labs Labs for chapters 2 10 2.2.2.5 Lab - Configuring IPv4 Static and Default Routes 2.3.2.4 Lab - Troubleshooting Static Routes 3.2.1.9 Lab - Configuring Basic RIPv2 5.2.2.9 Lab - Configuring

More information

Configuring Authentication Proxy

Configuring Authentication Proxy The Cisco IOS Firewall Authentication Proxy feature provides dynamic, per-user authentication and authorization, authenticating users against industry standard TACACS+ and RADIUS authentication protocols.

More information

Part number: DUA1756-1CAA01 Published: September 2005 SuperStack 3 Switch 4500 Family Command Reference Guide Version 3.1.

Part number: DUA1756-1CAA01 Published: September 2005 SuperStack 3 Switch 4500 Family Command Reference Guide Version 3.1. http://www.3com.com/ Part number: DUA1756-1CAA01 Published: September 2005 SuperStack 3 Switch 4500 Family Command Reference Guide Version 3.1.x 3Com Corporation 350 Campus Drive Marlborough, MA USA 01752-3064

More information

Table of Contents X Configuration 1-1

Table of Contents X Configuration 1-1 Table of Contents 1 802.1X Configuration 1-1 802.1X Overview 1-1 Architecture of 802.1X 1-1 Authentication Modes of 802.1X 1-2 Basic Concepts of 802.1X 1-2 EAP over LAN 1-3 EAP over RADIUS 1-5 802.1X Authentication

More information

Chapter 8: Lab B: Configuring a Remote Access VPN Server and Client

Chapter 8: Lab B: Configuring a Remote Access VPN Server and Client Chapter 8: Lab B: Configuring a Remote Access VPN Server and Client Topology IP Addressing Table Device Interface IP Address Subnet Mask Default Gateway Switch Port R1 FA0/1 192.168.1.1 255.255.255.0 N/A

More information

HP 6125G & 6125G/XG Blade Switches

HP 6125G & 6125G/XG Blade Switches HP 6125G & 6125G/XG Blade Switches Fundamentals Configuration Guide Part number: 5998-3153a Software version: Release 2103 and later Document version: 6W102-20141218 Legal and notice information Copyright

More information

Packet Tracer - Configure and Verify a Site-to-Site IPsec VPN Using CLI

Packet Tracer - Configure and Verify a Site-to-Site IPsec VPN Using CLI Packet Tracer - Configure and Verify a Site-to-Site IPsec VPN Using CLI Topology Addressing Table R1 R2 R3 Device Interface IP Address Subnet Mask Default Gateway Switch Port G0/0 192.168.1.1 255.255.255.0

More information

HP 5500 EI & 5500 SI Switch Series

HP 5500 EI & 5500 SI Switch Series HP 5500 EI & 5500 SI Switch Series Fundamentals Configuration Guide Part number: 5998-1707 Software version: Release 2220 Document version: 6W100-20130810 Legal and notice information Copyright 2013 Hewlett-Packard

More information

Configuring Authentication Proxy

Configuring Authentication Proxy Configuring Authentication Proxy Last Updated: January 7, 2013 The Cisco IOS Firewall Authentication Proxy feature provides dynamic, per-user authentication and authorization, authenticating users against

More information

Lab 7 Configuring Basic Router Settings with IOS CLI

Lab 7 Configuring Basic Router Settings with IOS CLI Lab 7 Configuring Basic Router Settings with IOS CLI Objectives Part 1: Set Up the Topology and Initialize Devices Cable equipment to match the network topology. Initialize and restart the router and switch.

More information

HP FlexFabric 5700 Switch Series

HP FlexFabric 5700 Switch Series HP FlexFabric 5700 Switch Series Security Command Reference Part number: 5998-6695 Software version: Release 2416 Document version: 6W100-20150130 Legal and notice information Copyright 2015 Hewlett-Packard

More information

Command-Line Interfaces

Command-Line Interfaces CHAPTER 2 This chapter describes the CLIs you use to configure the Catalyst 4500 series switch. This chapter includes the following major sections: Accessing the Switch CLI, page 2-1 Performing Command-Line

More information

Administration of Cisco WLC

Administration of Cisco WLC HTTP/HTTPS, SSH/Telnet to Cisco WLC, page 1 HTTP/HTTPS, SSH/Telnet to Cisco WLC Using the Controller GUI A browser-based GUI is built into each controller. It allows up to five users to simultaneously

More information

Chapter 2. Chapter 2 A. Configuring a Network Operating System

Chapter 2. Chapter 2 A. Configuring a Network Operating System Chapter 2 Chapter 2 A Configuring a Network Operating System Chapter 2 Cisco IOS IOS stands for Internetwork Operating System It is a family of software used on most Cisco Systems routers and current Cisco

More information

CCNA Security PT Practice SBA

CCNA Security PT Practice SBA A few things to keep in mind while completing this activity: 1. Do not use the browser Back button or close or reload any Exam windows during the exam. 2. Do not close Packet Tracer when you are done.

More information

Operation Manual Security. Table of Contents

Operation Manual Security. Table of Contents Table of Contents Table of Contents Chapter 1 Network Security Overview... 1-1 1.1 Introduction to the Network Security Features Provided by CMW... 1-1 1.2 Hierarchical Line Protection... 1-2 1.3 RADIUS-Based

More information

Lab Configuring Basic RIPv2 (Solution)

Lab Configuring Basic RIPv2 (Solution) (Solution) Topology 2017 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 15 Addressing Table Objectives Device Interface IP Address Subnet Mask Default Gateway

More information

ip source-track through ivrf

ip source-track through ivrf ip source-track through ivrf ip source-track, page 5 ip source-track address-limit, page 7 ip source-track export-interval, page 9 ip source-track syslog-interval, page 11 ip ssh, page 13 ip ssh break-string,

More information

Configuring Secure Shell

Configuring Secure Shell Configuring Secure Shell Last Updated: October 24, 2011 The Secure Shell (SSH) feature is an application and a protocol that provides a secure replacement to the Berkeley r-tools. The protocol secures

More information

CCNA 1 Chapter 2 v5.0 Exam Answers %

CCNA 1 Chapter 2 v5.0 Exam Answers % CCNA 1 Chapter 2 v5.0 Exam Answers 2015 100% 1. Which two features are characteristics of flash memory? (Choose two.) Flash provides nonvolatile storage. Flash receives a copy of the IOS from RAM when

More information