HP (Hewlett-Packard) A3100-8-PoE v2 EI Switch User Manual


 
Telnet login authentication modes ······················································································································· 37
Configuring none authentication for Telnet login ······························································································ 38
Configuring password authentication for Telnet login ······················································································ 39
Configuring scheme authentication for Telnet login ·························································································· 41
Configuring common settings for VTY user interfaces (optional)······································································ 45
Configuring the device to log in to a Telnet server as a Telnet client······························································ 46
Logging in through SSH ················································································································································ 47
Introduction ···························································································································································· 47
Configuring the SSH server·································································································································· 48
Configuring the SSH client to log in to the SSH server ····················································································· 51
Logging in through modems ········································································································································· 52
Introduction ···························································································································································· 52
Configuration requirements·································································································································· 52
Login procedure····················································································································································· 52
Modem login authentication modes···················································································································· 55
Configuring none authentication for modem login···························································································· 56
Configuring password authentication for modem login···················································································· 57
Configuring scheme authentication for modem login ······················································································· 58
Configuring common settings for modem login (optional)················································································ 62
Displaying and maintaining CLI login ························································································································· 64
Web login ··································································································································································66
Web login overview ······················································································································································ 66
Configuring HTTP login ················································································································································· 66
Configuring HTTPS login··············································································································································· 67
Displaying and maintaining web login ······················································································································· 70
Web login example······················································································································································· 70
HTTP login example ·············································································································································· 70
HTTPS login example ············································································································································ 71
NMS login··································································································································································74
NMS login overview······················································································································································ 74
Configuring NMS login················································································································································· 74
NMS login example······················································································································································· 75
User login control·······················································································································································78
User login control methods ··········································································································································· 78
Configuring login control over Telnet users················································································································· 78
Configuration preparation···································································································································· 78
Configuring source IP-based login control over Telnet users············································································ 78
Configuring source and destination IP-based login control over Telnet users ················································ 79
Configuring source MAC-based login control over Telnet users······································································ 79
Source MAC-based login control configuration example················································································· 80
Configuring source IP-based login control over NMS users······················································································ 81
Configuration preparation···································································································································· 81
Configuring source IP-based login control over NMS users············································································· 81
Source IP-based login control over NMS users configuration example ·························································· 82
Configuring source IP-based login control over web users ······················································································· 83
Configuration preparation···································································································································· 83
Configuring source IP-based login control over web users··············································································· 83
Logging off online web users ·······························································································································83
Source IP-based login control over web users configuration example ···························································· 84
FTP configuration························································································································································85
FTP overview··································································································································································· 85
Introduction to FTP················································································································································· 85
ii