D-Link DES-3010FA/GA Switch User Manual


 
D-Link DES-3010FA/GA User Guide
Page 40
The device reboots with no configuration and in 60 seconds starts sending BOOTP requests. The device
receives the IP address automatically.
Note
When the device reboot begins, any input at the ASCII terminal or keyboard automatically cancels the
BOOTP process before completion, and the device does not receive an IP address from the BOOTP
server.
The following example illustrates the process:
console# enable
console# delete startup-config
Startup file was deleted
console# reload
You haven’t saved your changes. Are you sure you want to continue (y/n)[n]?
This command will reset the whole system and disconnect your current session.Do you want
to continue (y/n)[n]?
******************************************************
/*the device reboots */
3. To verify the IP address, enter the show ip interface command. The device is now configured with an IP
address.
Security Management and Password Configuration
System security is handled through the AAA (Authentication, Authorization, and Accounting) mechanism that
manages user access rights, privileges, and management methods. AAA uses both local and remote user
databases. Data encryption is handled through the SSH mechanism.
The system is delivered with the user name admin, and no default password configured; all user names and
passwords are user-defined. If a user-defined user name and/or password is lost, a password recovery procedure
can be initiated from the Startup menu. The procedure is applicable for the local terminal only and allows a one-
time access to the device from the local terminal with no password entered.
The security passwords can be configured for the following services:
Console
Telnet
SSH
HTTP
HTTPS
Note
When creating a user name, the default priority is 1, which allows access but not configuration rights. A
priority of 15 must be set to enable full access and configuration rights to the device. Although user names
can be assigned privilege level 15 without a password, it is recommended to always assign a password.
If there is no specified password, privileged users can access the web interface with any password.