No part of this documentation may be reproduced or transmitted in any form or by any means without
prior written consent of Hewlett-Packard Development Company, L.P.
The information contained herein is subject to change without notice.
HEWLETT-PACKARD COMPANY MAKES NO WARRANTY OF ANY KIND WITH REGARD TO THIS
MATERIAL, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY
AND FITNESS FOR A PARTICULAR PURPOSE. Hewlett-Packard shall not be liable for errors contained
herein or for incidental or consequential damages in connection with the furnishing, performance, or
use of this material.
The only warranties for HP products and services are set forth in the express warranty statements
accompanying such products and services. Nothing herein should be construed as constituting an
additional warranty. HP shall not be liable for technical or editorial errors or omissions contained
herein.
FIPS compliance ································································································································································ 1
What is CLI? ······································································································································································ 1
Entering the CLI ································································································································································· 2
Command conventions ····················································································································································· 2
Undo form of a command ················································································································································ 3
CLI view description ·························································································································································· 3
Entering system view ················································································································································ 4
Exiting the current view ············································································································································ 4
Returning to user view ·············································································································································· 4
Using the CLI online help ················································································································································· 5
Typing commands ····························································································································································· 6
Redisplaying input but not submitted commands ·································································································· 8
Checking command line errors ········································································································································ 9
Using command history ···················································································································································· 9
Accessing history commands ·································································································································· 9
Configuring the history buffer size ······················································································································ 10
Controlling the CLI display ············································································································································ 10
Filtering output information ··································································································································· 11
Configuring user privilege and command levels ········································································································ 14
Configuring a user privilege level ······················································································································· 15
Switching user privilege level ······························································································································· 18
Modifying the level of a command ····················································································································· 21
Saving the current configuration ·································································································································· 22
Displaying and maintaining CLI ··································································································································· 22
FIPS compliance ····························································································································································· 23
Login methods ································································································································································· 23
User interface overview ················································································································································· 24
Users and user interfaces······································································································································ 24
Numbering user interfaces ··································································································································· 25
Overview ········································································································································································· 26
FIPS compliance ····························································································································································· 26
Logging in through the console port ···························································································································· 26
Configuring none authentication for console login ··························································································· 30
Configuring password authentication for console login ··················································································· 31
Configuring scheme authentication for console login ······················································································· 32
Configuring common settings for console login (optional) ··············································································· 34
Logging in through telnet ··············································································································································· 36
Configuring none authentication for telnet login ······························································································· 38
Configuring password authentication for telnet login ······················································································· 39
Configuring scheme authentication for telnet login ··························································································· 40
Configuring common settings for VTY user interfaces (optional) ······································································ 44
Configuring the device to log in to a telnet server as a telnet client ································································ 45
Logging in through SSH ················································································································································ 46
Configuring the SSH server ·································································································································· 47
Configuring the SSH client to log in to the SSH server ····················································································· 50
Logging in through modems ········································································································································· 51
Configuring none authentication for modem login ···························································································· 55
Configuring password authentication for modem login ···················································································· 55
Configuring scheme authentication for modem login ······················································································· 56
Configuring common settings for modem login (optional) ················································································ 59
Displaying and maintaining CLI login ························································································································· 62
Web login ·································································································································································· 63
Web login overview ······················································································································································ 63
FIPS compliance ····························································································································································· 64
Configuring HTTP login ················································································································································· 64
Configuring HTTPS login ··············································································································································· 65
Displaying and maintaining web login ······················································································································· 67
Web login example ······················································································································································· 67
HTTP login example ·············································································································································· 67
HTTPS login example ············································································································································ 69
User login control ······················································································································································· 75
User login control overview ·········································································································································· 75
FIPS compliance ····························································································································································· 75
Configuring login control over telnet users ·················································································································· 75
Configuring source IP-based login control over telnet users ············································································· 76
Configuring source and destination IP-based login control over telnet users ················································· 76
Configuring source MAC-based login control over telnet users ······································································· 77
Source MAC-based login control configuration example ················································································· 77
Configuring source IP-based login control over NMS users ······················································································ 78
Configuring source IP-based login control over NMS users ············································································· 78
Source IP-based login control over NMS users configuration example ·························································· 79
Configuring source IP-based login control over web users ······················································································· 80
Configuring source IP-based login control over web users ··············································································· 80
Logging off online web users ······························································································································· 81
Source IP-based login control over web users configuration example ···························································· 81
Introduction to FTP ················································································································································· 83
ii
Page 5
Operation of FTP ··················································································································································· 83
FIPS compliance ····························································································································································· 84
Configuring the FTP client ············································································································································· 84
Establishing an FTP connection ···························································································································· 85
Operating the directories on an FTP server ········································································································ 86
Operating the files on an FTP server ··················································································································· 86
Using another username to log in to an FTP server ··························································································· 87
Maintaining and debugging an FTP connection ································································································ 88
Terminating an FTP connection ···························································································································· 88
FTP client configuration example ························································································································· 88
Configuring the FTP server ············································································································································ 90
Configuring FTP server operating parameters ···································································································· 90
Configuring authentication and authorization on the FTP server ····································································· 91
FTP server configuration example ························································································································ 92
Displaying and maintaining FTP ··································································································································· 93
Introduction to TFTP ··············································································································································· 95
Operation of TFTP ················································································································································· 95
FIPS compliance ····························································································································································· 96
Configuring the TFTP client············································································································································ 96
Displaying and maintaining the TFTP client ················································································································ 97
TFTP client configuration example ································································································································ 97
Displaying directory information ······················································································································· 100
Displaying the current working directory ·········································································································· 100
Changing the current working directory ··········································································································· 100
Creating a directory ············································································································································ 100
Removing a directory ·········································································································································· 101
File operations ······························································································································································ 101
Displaying file information ································································································································· 101
Displaying the contents of a file ························································································································· 101
Renaming a file ···················································································································································· 101
Copying a file ······················································································································································ 102
Moving a file ························································································································································ 102
Deleting a file ······················································································································································· 102
Restoring a file from the recycle bin ·················································································································· 102
Emptying the recycle bin ···································································································································· 102
Managing the space of a storage medium ······································································································ 103
Displaying and maintaining the NAND flash memory ··················································································· 104
Setting prompt modes ·················································································································································· 105
Example for file operations ········································································································································· 105
Configuration file format and content ··············································································································· 108
Startup configuration loading process ·············································································································· 108
iii
Page 6
FIPS compliance ··························································································································································· 110
Saving the running configuration ······························································································································· 110
Modes in saving the configuration ···················································································································· 111
Using automatic configuration backup after a software upgrade ································································· 111
Setting configuration rollback ····································································································································· 112
Configuration task list ········································································································································· 113
Configuring parameters for saving the running configuration ······································································· 113
Enabling automatic saving of the running configuration ················································································ 114
Manually saving the running configuration ······································································································ 115
Setting configuration rollback ···························································································································· 115
Specifying a startup configuration file to be used at the next system startup ························································ 116
Backing up the startup configuration file ··················································································································· 116
Deleting a startup configuration file to be used at the next startup ········································································ 117
Restoring a startup configuration file ························································································································· 117
Displaying and maintaining a configuration file ······································································································ 118
Switch software overview ············································································································································ 119
FIPS compliance ··························································································································································· 120
Software upgrade methods ········································································································································· 120
Upgrading the Boot ROM program through a system reboot ················································································· 120
Upgrading the boot file through a system reboot ····································································································· 122
Upgrading the boot file of an IRF member switch ···································································································· 122
Software upgrade by installing hotfixes ···················································································································· 123
Basic concepts in hotfix ······································································································································ 123
Patch status ··························································································································································· 124
Step-by-step patch uninstallation ························································································································ 128
Displaying and maintaining the software upgrade ·································································································· 129
Software upgrade configuration examples ··············································································································· 129
Immediate upgrade configuration example ····································································································· 129
Hotfix configuration example ····························································································································· 131
Device management overview ···································································································································· 134
Configuring the device name ····································································································································· 134
Configuring the system clock ······································································································································ 134
Configuring the system clock ····························································································································· 134
Displaying the system clock ································································································································ 135
Enabling displaying the copyright statement ············································································································ 138
Configuring banners ···················································································································································· 138
Introduction to banners ······································································································································· 138
Banner configuration example ··························································································································· 140
Configuring the exception handling method ············································································································· 140
Rebooting the device ··················································································································································· 141
Configuring scheduled tasks ······································································································································· 142
What is a scheduled task ··································································································································· 142
Configuring a scheduled task ···························································································································· 142
Configuring the detection timer ·································································································································· 144
iv
Page 7
Configuring temperature alarm thresholds for a member device ··········································································· 145
Clearing the 16-bit interface indexes not used in the current system ····································································· 146
Disabling password recovery capability ··················································································································· 146
Identifying and diagnosing pluggable transceivers ································································································· 147
Introduction to pluggable transceivers ·············································································································· 147
Support and other resources ·································································································································· 150
Contacting HP ······························································································································································ 150
Subscription service ············································································································································ 150
Related information ······················································································································································ 150
Index ········································································································································································ 153
v
Page 8
CLI configuration
This chapter includes these sections:
• What is CLI?
• Entering the CLI
• Command conventions
• Undo form of a command
• CLI view description
• Using the CLI online help
• Typing commands
• Checking command line errors
• Using command history
• Controlling the CLI display
• Configuring user privilege and command levels
• Saving the current configuration
• Displaying and maintaining CLI
FIPS compliance
The device supports the FIPS mode that complies with NIST FIPS 140-2 requirements. Support for features,
commands, and parameters might differ in FIPS mode and non-FIPS mode. For more information about
FIPS mode, see the Security Configuration Guide.
Unless otherwise noted, devices in the configuration examples are operating in non-FIPS mode.
What is CLI?
The command line interface (CLI) enables you to interact with your device by typing text commands. At
the CLI, you can instruct your device to perform a given task by typing a text command and then pressing
Enter. Compared with the graphical user interface (GUI) where you can use a mouse to perform
configurations, the CLI allows you to input more information in one command line.
1
Page 9
Figure 1 CLI example
p
Entering the CLI
HP devices provide multiple methods for entering the CLI, such as through the console port, through telnet,
or through SSH. For more information, see "Logging in through the console port."
Command conventions
Command conventions help you understand command meanings. Commands in HP product manuals
comply with the conventions listed in Table 1.
Table 1 Command conventions
Convention Descri
Boldface Bold text represents commands and keywords that you enter literally as shown.
ItalicItalic text represents arguments that you replace with actual values.
[ ]
{ x | y | ... }
[ x | y | ... ]
{ x | y | ... } *
[ x | y | ... ] *
&<1-n>
Square brackets enclose syntax choices (keywords or arguments) that are
optional.
Braces enclose a set of required syntax choices separated by vertical bars, from
which you select one.
Square brackets enclose a set of optional syntax choices separated by vertical
bars, from which you select one or none.
Asterisk marked braces enclose a set of required syntax choices separated by
vertical bars, from which you select at least one.
Asterisk marked square brackets enclose optional syntax choices separated by
vertical bars, from which you select one choice, multiple choices, or none.
The argument or keyword and argument combination before the ampersand (&)
sign can be entered 1 to n times.
tion
# A line that starts with a pound (#) sign is comments.
NOTE:
The keywords of HP command lines are case insensitive.
2
Page 10
Use the clock datetimetime date command as an example to understand the meaning of the command
line parameters according to Figure 2.
Figure 2 Read command line parameters
clock datetime
Boldface: Keywords
For example, you can type the following command line at the CLI of your device and press Enter to set
the device system time to 10 o'clock 30 minutes 20 seconds, February 23, 2010.
<sysname> clock datetime 10:30:20 2/23/2010
You can read any command that is more complicated by referring to Table 1.
time date
Italic: Arguments.
Replace them with
actual values at the
CLI.
Undo form of a command
The undo form of a command restores the default, disables a function, or removes a configuration.
Almost all configuration commands have an undo form. For example, the info-center enable command
enables the information center, and the undo info-center enable command disables the information
center.
CLI view description
Commands are grouped into different classes by function. To use a command, you must enter the class
view of the command.
CLI views adopt a hierarchical structure. See Figure 3.
• A
fter logging in to the switch, you are in user view. The prompt of user view is <device name>. In
user view, you can perform display, debugging, and file management operations, set the system
time, restart your device, and perform FTP and telnet operations.
• You can enter system view from user view. In system view, you can configure parameters such as
daylight saving time, banners, and short-cut keys.
• From system view, you can enter different function views. For example, enter interface view to
configure interface parameters, create a VLAN and enter its view, enter user interface view to
configure login user attributes, create a local user and enter local user view to configure the
password and level of the local user.
NOTE:
Enter ? in any view to display all the commands that can be executed in this view.
3
Page 11
Figure 3 Command line views
y
Interface
view
VLAN view
User view
System
view
Entering system view
When you log in to the device, you automatically enter user view, where <Device name> is displayed.
You can perform limited operations in user view, for example, display operations, file operations, and
Telnet operations. To perform further configuration for the device, enter system view.
Follow the step below to enter system view:
To do… Use the command…
Enter system view system-view
User
Interface
view
Local user
view
Remarks
Required
Available in user view
Exiting the current view
The CLI is divided into different command views. Each view has a set of specific commands and defines
the effective scope of the commands. The commands available to you at any given time depend on the
view you are in.
Follow the step below to exit the current view:
To do… Use the command…
Return to the parent view from the
current view
NOTE:
• The quit command in user view stops the current connection between the terminal and the device.
• In public key code view, use the public-key-code end command to return to the parent view (public ke
view). In public key view, use the peer-public-key end command to return to system view.
Returning to user view
This feature allows you to return to user view from any other view, without using the quit command
repeatedly. You can also press Ctrl+Z to return to user view from the current view.
quit
Remarks
Required
Available in any view.
4
Page 12
Follow the step below to exit to user view:
To do… Use the command…
Return to user view return
Using the CLI online help
Type a question mark (?) to obtain online help. See the following examples.
1. Type ? in any view to display all commands available in this view and brief descriptions of these
commands. For example:
<sysname> ?
User view commands:
archive Specify archive settings
backup Backup next startup-configuration file to TFTP server
boot-loader Set boot loader
bootrom Update/read/backup/restore bootrom
cd Change current directory
…Omitted…
2. Type part of a command and a ? separated by a space.
Remarks
Required
Available in any view except user
view
If ? is at the position of a keyword, the CLI displays all possible keywords with a brief description for each
keyword. For example:
<sysname> terminal ?
debugging Send debug information to terminal
logging Send log information to terminal
monitor Send information output to current terminal
trapping Send trap information to terminal
If ? is at the position of an argument, the CLI displays a description about this argument. For example:
The string <cr> indicates that the command is a complete command, and you can execute the command
by pressing Enter.
3. Type an incomplete character string followed by a ?. The CLI displays all commands starting with
the typed character(s).
<sysname> c?
cd
clock
cluster
copy
<sysname> display cl?
clipboard
5
Page 13
clock
y
cluster
Typing commands
Editing command lines
Table 2 lists some shortcut keys you can use to edit command lines.
Table 2 Editing functions
Ke
Function
Common keys
Backspace
Left arrow key or Ctrl+BThe cursor moves one character space to the left.
Right arrow key or Ctrl+FThe cursor moves one character space to the right.
Tab
If the edit buffer is not full, pressing a common key inserts the character at the
position of the cursor and moves the cursor to the right.
Deletes the character to the left of the cursor and moves the cursor back one
character.
If you press Tab after entering part of a keyword, the system automatically
completes the keyword:
• If finding a unique match, the system substitutes the complete keyword for
the incomplete one and displays it in the next line.
• If there is more than one match, you can press Tab repeatedly to display
in cycles all the keywords starting with the character string that you typed.
• If there is no match, the system does not modify the incomplete keyword
and displays it again in the next line.
Typing incomplete keywords
You can input a command comprising incomplete keywords that uniquely identify the complete
command.
In user view, for example, command system-view, to enter system view, type sy.
You can also press Tab to have an incomplete keyword automatically completed.
Configuring command aliases
The command keyword alias function allows you to replace the first keyword of a non-undo command or
the second keyword of an undo command with your preferred keyword when you execute the command.
For example, if you configure show as the alias for the display keyword, you can enter either show clock
or display clock to execute the display clock command.
Usage guidelines
• After you successfully execute a command by using a keyword alias, the system displays and saves
the keyword, instead of its alias.
•When you define a command alias, the cmdkey and alias arguments must be in their complete
form.
6
Page 14
• If a string you entered partially matches a keyword and an alias, the command indicated by the
y
alias is executed. To execute the command indicated by the keyword, enter the complete keyword.
• If a string you entered exactly matches a keyword and partially matches an alias, the command
indicated by the keyword is executed. To execute the command indicated by the alias, enter the
complete alias.
• If you enter a string that partially matches multiple aliases, the system displays a prompt.
• If you press Tab after you input the keyword of an alias, the original format of the keyword is
displayed.
Configuration procedure
Follow these steps to configure command aliases:
To do… Use the command…
Enter system view system-view —
Enable the command alias function command-alias enable
Disabled by default, which means
you cannot configure command
aliases.
Required
Not configured by default.
Remarks
Optional
The Ctrl+G, Ctrl+L and Ctrl+O
hotkeys are specified at the CLI by
default.
Available in any view. See Table 3
for hotkeys reserved by the syst
em.
NOTE:
By default, the Ctrl+G, Ctrl+L and Ctrl+O hotkeys are associated with pre-defined commands and the
Ctrl+T and Ctrl+U hotkeys are not.
• Ctrl+G corresponds to the display current-configuration command.
• Ctrl+L corresponds to the display ip routing-table command.
• Ctrl+O corresponds to the undo debugging all command.
Table 3 Hotkeys reserved by the system
Hotke
Ctrl+A Moves the cursor to the beginning of the current line.
Ctrl+B Moves the cursor one character to the left.
Function
7
Page 15
Hotkey Function
Ctrl+C Stops performing a command.
Ctrl+D Deletes the character at the current cursor position.
Ctrl+E Moves the cursor to the end of the current line.
Ctrl+F Moves the cursor one character to the right.
Ctrl+H Deletes the character to the left of the cursor.
Ctrl+K Terminates an outgoing connection.
Ctrl+N Displays the next command in the history command buffer.
Ctrl+P Displays the previous command in the history command buffer.
Ctrl+R Redisplays the current line information.
Ctrl+V Pastes the content in the clipboard.
Ctrl+W
Ctrl+X Deletes all the characters to the left of the cursor.
Ctrl+Y Deletes all the characters to the right of the cursor.
Ctrl+Z Exits to user view.
Ctrl+] Terminates an incoming connection or a redirect connection.
Esc+B
Esc+D
Esc+F
Esc+N
Esc+P Moves the cursor up by one line (available before you press Enter)
Esc+< Specifies the cursor as the beginning of the clipboard.
Esc+> Specifies the cursor as the ending of the clipboard.
Deletes all the characters in a continuous string to the left of the
cursor.
Moves the cursor to the leading character of the continuous string to
the left.
Deletes all the characters of the continuous string at the current
cursor position and to the right of the cursor.
Moves the cursor to the front of the next continuous string to the
right.
Moves the cursor down by one line (available before you press
Enter)
NOTE:
The hotkeys in the table above are defined by the switch. If the same hotkeys are defined by the terminal
software that you use to interact with the switch, the hotkeys defined by the terminal software take effect.
Redisplaying input but not submitted commands
If your command input is interrupted by output system information, you can use this feature to redisplay
the previously input but not submitted commands.
Follow these steps to enable redisplaying of input but not submitted commands:
To do… Use the command… Remarks
Enter system view system-view —
8
Page 16
To do… Use the command… Remarks
g
d
y
Enable redisplaying of input but
not submitted commands
info-center synchronous
NOTE:
• If you have no input at the command line prompt and the system outputs system information such as
logs, the system will not display the command line prompt after the output.
• If the system outputs system information when you are typin
confirmation), the system will not redisplay the prompt information but a line break after the output and
then display what you have typed.
• For more information about the info-center synchronous command, see the
Monitoring Command Reference
.
Checking command line errors
If a command contains syntax errors, the CLI reports error information.
Table 4 Common command line errors
Error information
% Unrecognized command found at '^' position. The command was not found.
Cause
Required
Disabled by default
interactive information (not YES/NO for
Network Management an
% Incomplete command found at '^' position. Incomplete command
% Ambiguous command found at '^' position. Ambiguous command
Too many parameters Too many parameters
% Wrong parameter found at '^' position. Wrong parameters
Using command history
The CLI automatically saves the commands recently used in the history command buffer. You can access
and execute them again.
Accessing history commands
Follow a step below to access history commands:
To do… Use the ke
Display history commands display history-command
Display the previous history
command
Display the next history
command
Up arrow key or Ctrl+P
Down arrow key or Ctrl+NDisplays the next history command, if any
/command…
Result
Displays valid history commands you
used
Displays the previous history command, if
any
9
Page 17
NOTE:
You can use arrow keys to access history commands in Windows 200X and XP Terminal or Telnet.
However, the up and down arrow keys are invalid in Windows 9X HyperTerminal, because they are
defined differently. You can use Ctrl+P or Ctrl+N instead.
• The commands saved in the history command buffer are in the same format in which you typed the
commands. If you type an incomplete command, the command saved in the history command
buffer is also an incomplete one.
• If you execute the same command repeatedly, the switch saves only the earliest record. However, if
you execute the same command in different formats, the system saves them as different commands.
For example, if you execute the display cu command repeatedly, the system saves only one
command in the history command buffer. If you execute the command in the format of display cu
and display current-configuration respectively, the system saves them as two commands.
• By default, the CLI can save up to 10 commands for each user. To set the capacity of the history
command buffer for the current user interface, use the history-command max-size command. (For
more information about the history-command max-size command, see the Fundamentals Command Reference.
Configuring the history buffer size
Follow these steps to configure the history buffer size:
To do… Use the command…
Enter system view system-view —
user-interface { first-num1
Enter user interface view
Set the maximum number of
commands that can be saved in the
history buffer
NOTE:
For more information about the user-interface and history-command max-size commands, see the
If the output information spans multiple screens, each screen pauses after it is displayed. Perform one of
the following operations to proceed.
Remarks
—
Optional
By default, the history buffer can
save up to 10 commands.
Action Function
Press SpaceDisplays the next screen.
Press EnterDisplays the next line.
10
Page 18
Action Function
g
Press Ctrl+CStops the display and the command execution.
Press <PageUp> Displays the previous page.
Press <PageDown> Displays the next page.
By default, each screen displays up t o 24 lin es. To cha n ge the m aximum numb er of line s displayed o n the
next screen, use the screen-length command. For more information about the screen-length command,
see the Fundamentals Command Reference.
Disabling multi-screen display
You can use the following command to disable the multi-screen display function. All of the output
information is displayed at one time and the screen is refreshed continuously until the last screen is
displayed.
To do… Use the command…
Disable the multi-screen display
function
screen-length disable
Filtering output information
NOTE:
Only display commands that support | { begin | exclude | include }
output information. When the display commands support these parameters depends on your device
model.
Remarks
Required
By default, a login user uses the
settings of the screen-length
command. The default settings of the
screen-length command are:
multiple-screen display is enabled
and up to 24 lines are displayed on
the next screen.
This command is executed in user
view, and takes effect for the current
user only. When the user re-logs into
the switch, the default configuration
is restored.
regular-expression
] support filterin
Introduction
You can use regular expressions in display commands to filter output information.
The following methods are available for filtering output information:
•Input the begin, exclude, or include keyword plus a regular expression in the display command to
filter the output information.
• When the system displays the output information in multiple screens, use /, - or + plus a regular
expression to filter subsequent output information. / equals the keyword begin, - equals the
keyword exclude, and + equals the keyword include.
The following definitions apply to the begin, exclude, and include keywords:
•begin: Displays the first line that matches the specified regular expression and all lines that follow.
11
Page 19
•exclude: Displays all lines that do not match the specified regular expression.
g
•include: Displays all lines that match the specified regular expression.
A regular expression is a case sensitive string of 1 to 256 characters. It supports the following special
characters.
Character Meanin
^string
string$
.
*
+
|
_
Starting sign. string appears only at
the beginning of a line.
Ending sign. string appears only at
the end of a line.
Matches any single character, such
as a single character, a special
character, and a blank.
Matches the preceding character or
character group zero or multiple
times.
Matches the preceding character or
character group one or multiple
times
Matches the preceding or
succeeding character string
If it is at t h e beginn i n g or the e nd of a
regular expression, it equals ^ or $.
In other cases, it equals comma,
space, round bracket, or curly
bracket.
Remarks
For example, regular expression "^user" only
matches a string beginning with "user", not
"Auser".
For example, regular expression "user$" only
matches a string ending with "user", not "userA".
For example, ".s" matches "as" and "bs".
For example, "zo*" matches "z" and "zoo";
"(zo)*" matches "zo" and "zozo".
For example, "zo+" matches "zo" and "zoo", but
not "z".
For example, "def|int" only matches a character
string containing "def" or "int".
For example, "a_b" matches "a b" or "a(b"; "_ab"
only matches a line starting with "ab"; "ab_" only
matches a line ending with "ab".
-
[ ]
( )
It connects two values (the smaller
one before it and the bigger one
after it) to indicate a range together
with [ ].
Matches a single character
contained within the brackets.
A character group. It is usually used
with "+" or "*".
For example, "1-9" means 1 to 9 (inclusive); "a-h"
means a to h (inclusive).
For example, [16A] matches a string containing
any character among 1, 6, and A; [1-36A] matches
a string containing any character among 1, 2, 3, 6,
and A (- is a hyphen).
"]" can be matched as a common character only
when it is put at the beginning of characters within
the brackets, for example [ ]string]. There is no such
limit on "[".
For example, (123A) means a character group
"123A"; "408(12)+" matches 40812 or
408121212. But it does not match 408.
12
Page 20
Character Meaning Remarks
Repeats the character string
specified by the index. A character
For example, (string)\1 repeats string, and a
matching string must contain stringstring.
(string1)(string2)\2 repeats string2, and a
matching string must contain string1string2string2.
(string1)(string2)\1\2 repeats string1 and string2
respectively, and a matching string must contain
string1string2string1string2.
For example, [^16A] means to match a string
containing any character except 1, 6 or A, and the
matching string can also contain 1, 6 or A, but
cannot contain these three characters only. For
example, [^16A] matches "abc" and "m16", but
not 1, 16, or 16A.
\index
[^]
string refers to the string within ()
before \. index refers to the
sequence number (starting from 1
from left to right) of the character
group before \. If only one character
group appears before \, index can
only be 1; if n character groups
appear before index, index can be
any integer from 1 to n.
Matches a single character not
contained within the brackets.
\<string
string\>
\bcharacter2
\Bcharacter
character1\w
\W Equals \b.
\
Matches a character string starting
with string.
Matches a character string ending
with string.
Matches character1character2. character1 can be any character
except number, letter or underline,
and \b equals [^A-Za-z0-9_].
Matches a string containing
character, and no space is allowed
before character.
Matches character1character2. character2 must be a number, letter,
or underline, and \w equals
[^A-Za-z0-9_].
Escape character. If a special
character listed in this table follows
\, the specific meaning of the
character is removed.
For example, "\<do" matches word "domain" and
string "doa".
For example, "do\>" matches word "undo" and
string "abcdo".
For example, "\ba" matches "-a" with "-" being
character1, and "a" being character2, but it does
not match "2a" or "ba".
For example, "\Bt" matches "t" in "install", but not
"t" in "big top".
For example, "v\w" matches "vlan", with "v" being
character1, and "l" being character2. v\w also
matches "service", with "i" being character2.
For example, "\Wa" matches "-a", with "-" being
character1, and "a" being character2, but does not
match "2a" or "ba".
For example, "\\" matches a string containing "\",
"\^" matches a string containing "^", and "\\b"
matches a string containing "\b".
Example of filtering output information
1. Example of using the begin keyword
# Display the configuration from the line containing "user-interface" to the last line in the current
configuration (the output information depends on the current configuration).
<Sysname> display current-configuration | begin user-interface
user-interface aux 0
user-interface vty 0 15
authentication-mode none
13
Page 21
user privilege level 3
g
#
return
2. Example of using the exclude keyword
# Display the non-direct routes in the routing table (the output depends on the current configuration).
<Sysname> display ip routing-table | exclude Direct
Routing Tables: Public
Destination/Mask Proto Pre Cost NextHop Interface
10.1.1.0/24 Static 60 2 10.1.1.2 Vlan2
3. Example of using the include keyword
# Display the route entries that contain Vlan in the routing table (the output depends on the current
configuration).
<Sysname> display ip routing-table | include Vlan
Routing Tables: Public
Destination/Mask Proto Pre Cost NextHop Interface
192.168.1.0/24 Direct 0 0 192.168.1.42 Vlan999
Configuring user privilege and command levels
To avoid unauthorized access, the switch defines user privilege levels and command levels. User privilege
levels correspond to command levels. When a user at a specific privilege level logs in, the user can only
use commands at that level, or lower levels.
All the commands are categorized into four levels: visit, monitor, system, and manage, and are identified
from low to high, respectively by 0 through 3. Table 5 de
Table 5 Default command levels
Level Privile
0 Visit
1 Monitor
2 System
e Description
Involves commands for network diagnosis and accessing an external device.
Configuration of commands at this level cannot survive a device restart. Upon
device restart, the commands at this level will be restored to the default settings.
Commands at this level include ping, tracert, telnet and ssh2.
Involves commands for system maintenance and service fault diagnosis.
Commands at this level are not allowed to be saved after being configured. After
the switch is restarted, the commands at this level will be restored to the default
settings.
Commands at this level include debugging, terminal, refresh, reset, and send.
Involves service configuration commands, such as routing configuration
commands and commands for configuring services at different network levels.
By default, commands at this level include all configuration commands except for
those at the manage level.
scribes the command levels.
14
Page 22
Level Privilege Description
Involves commands that influence the basic operation of the system and
commands for configuring system support modules.
3 Manage
By default, commands at this level involve the configuration commands of file
system, FTP, TFTP, Xmodem download, user management, level setting, and
parameter settings within a system (which are not defined by any protocols or
RFCs).
Configuring a user privilege level
A user privilege level can be configured by using AAA authentication parameters or under a user
interface.
Configure user privilege level by using AAA authentication parameters
If the authentication mode of a user interface is scheme, the user privilege level of users logging into the
user interface is specified in AAA authentication configuration.
Follow these steps to configure the user privilege level by using AAA authentication parameters:
To do… Use the command…
Enter system view system-view —
user-interface { first-num1
Enter user interface view
Specify the scheme authentication
mode
Return to system view quit —
Configure the authentication mode
for SSH users as password
[ last-num1 ] | { aux | vty }
first-num2 [ last-num2 ] }
authentication-mode scheme
For more information about SSH,
see the Security Configuration Guide.
• Use the local-user command to
create a local user and enter
local user view.
•Use the level keyword in the
authorization-attribute
command to configure the user
privilege level.
Configure the user privilege level
on the authentication server
Configure the
user privilege
level by using
AAA
authentication
parameters
Using local
authentication
Using remote
authentication
(RADIUS,
HWTACACS
authentications)
Remarks
—
Required
By default, the authentication
mode for VTY users is password,
and no authentication is needed
for AUX login users.
Required if users use SSH to log in,
and username and password are
needed at authentication
Use either approach
• For local authentication, if you
do not configure the user
privilege level, the user
privilege level is 0.
• For remote authentication, if
you do not configure the user
privilege level, the user
privilege level depends on the
default configuration of the
authentication server.
Example of configuring a user privilege level by using AAA authentication parameters
# You are required to authenticate the users that telnet to the switch through VTY 1, verify their username
and password, and specify the user privilege level as 3.
When users telnet to the switch through VT Y 1, they need to i nput username test and password 12345678.
After passing the authentication, the users can only use the commands of level 0. If the users want to use
commands of levels 0, 1, 2 and 3, the following configuration is required:
Configuring the user privilege level under a user interface
•If the authentication mode of a user interface is scheme, and SSH publickey authentication type
(only a username is needed for this authentication type) is adopted, the user privilege level of users
logging into the user interface is the user interface level.
• If the authentication mode of a user interface is none or password, the user privilege level of users
logging into the user interface is the user interface level.
Follow these steps to configure the user privilege level under a user interface (SSH publickey
authentication type):
To do… Use the command…
Configure the authentication type
for SSH users as publickey
Enter system view system-view —
Enter user interface view
Configure the authentication mode
for any user that uses the current
user interface to log in to the switch
Configure the privilege level for
users that log in through the current
user interface
For more information about SSH,
see the Security Configuration Guide.
Required if the SSH login mode is
adopted, and only username is
needed during authentication.
After the configuration, the
authentication mode of the
corresponding user interface must
be set to scheme.
—
Required
By default, the authentication
mode for VTY users is password,
and no authentication is needed
for AUX users.
Optional
By default, the user privilege level
for users logged in through the
AUX user interface is 3, and that
for users logged in through the VTY
interfaces is 0.
Follow these steps to configure the user privilege level under a user interface (none or password
authentication mode):
Configure the authentication mode
for any user that uses the current
user interface to log in to the switch
authentication-mode { none |
password }
Configure the privilege level of
users logged in through the current
user privilege levellevel
user interface
Examples of configuring a user privilege level under a user interface
# Configure the switch to allow Telnet users to log in without authentication. (Free access brings security
risks. For security, do not allow free access.)
By default, the authentication
mode for VTY user interfaces is
password, and no authentication is
needed for AUX login users.
Optional
By default, the user privilege level
for users logged in through the
AUX user interface is 3, and that
for users logged in through the VTY
interfaces is 0.
Now, Telnet users can log in to the switch without authentication, but can use only the following
commands:
<Sysname> ?
User view commands:
display Display current system information
ping Ping function
quit Exit from current command view
rsh Establish one RSH connection
ssh2 Establish a secure shell client connection
super Set the current user priority level
telnet Establish one TELNET connection
tftp Open TFTP connection
tracert Trace route function
# Set the user privilege level to 1 for Telnet users.
[Sysname-ui-vty0-15] user privilege level 1
Now, Telnet users can access more commands:
<Sysname> ?
User view commands:
debugging Enable system debugging functions
dialer Dialer disconnect
display Display current system information
ping Ping function
quit Exit from current command view
17
Page 25
refresh Do soft reset
reset Reset operation
rsh Establish one RSH connection
screen-length Specify the lines displayed on one screen
send Send information to other user terminal interface
ssh2 Establish a secure shell client connection
super Set the current user priority level
telnet Establish one TELNET connection
terminal Set the terminal line characteristics
tftp Open TFTP connection
tracert Trace route function
undo Cancel current setting
# Configure the switch to authenticate Telnet users by verifying their password, and set their user privilege
level to 2.
By default, telnet users can use the commands of level 0 after passing authentication. After the
configuration above is completed, when users log in to the switch through Telnet, they need to input
password 12 3, and then they can use commands of levels 0, 1, and 2.
NOTE:
• For more information about user interfaces, see "Login methods." F
user-interface, authentication-mode, and user privilege level commands, see the
Command Reference
.
• For more information about AAA authentication, see the Security Configuration Guide. For more
information about the local-user and authorization-attribute commands, see the
Reference
.
• For more information about SSH, see the
Switching user privilege level
Users can switch to a different user privilege level temporarily without logging out and terminating the
current connection. After the privilege level switch, users can continue to configure the switch without the
need to re-log in, but the commands that they can execute have changed. For example, if the current user
privilege level is 3, the user can configure system parameters. After switching to user privilege level 0, the
user can only execute simple commands, like ping and tracert, and only a few display commands. The
switching operation is effective for the current login. After the user logs in again, the user privilege
restores to the original level.
• To avoid problems, HP recommends that administrators log in to the switch by using a lower
privilege level and view switch operating parameters, and when they have to maintain the switch,
they can switch to a higher level temporarily
or more information about the
Security Configuration Guide
Fundamentals
Security Command
.
• If the administrators need to leave for a while or ask someone else to manage the switch temporarily,
they can switch to a lower privilege level before they leave to restrict the operation by others.
18
Page 26
Setting the authentication mode for user privilege level switch
A user can switch to a privilege level equal to or lower than the current one unconditionally and is not
required to input a password (if any).
For security, a user is required to input the password (if any) to switch to a higher privilege level. The
authentication falls into one of the following four categories:
Authentication
mode
local
scheme
local scheme
Meaning Description
The switch authenticates a user by using the privilege level switch
Local password
authentication
Remote AAA
authentication
through
HWTACACS or
RADIUS
password input by the user.
When this mode is applied, you need to set the password for
privilege level switch with the super password command.
The switch sends the username and password for privilege level
switch to the HWTACACS or RADIUS server for remote
authentication.
When this mode is applied, you need to perform the following
configurations:
• Configure HWTACACS or RADIUS scheme and reference the
created scheme in the ISP domain. For more information, see the
Security Configuration Guide.
• Create the corresponding user and configure password on the
HWTACACS or RADIUS server.
Performs the local
password
authentication first
and then the
remote AAA
authentication
The switch authenticates a user by using the local password first. If
no local password is set, the privilege level is switched directly for
the users logged in from the AUX port, and remote AAA
authentication is performed on the users logged in from VTY user
interfaces.
Performs remote
AAA authentication is performed first, and if the remote
HWTACACS or RADIUS server does not respond or AAA
configuration on the switch is invalid, the local password
authentication is performed.
scheme local
AAA
authentication first
and then the local
password
authentication
Follow these steps to set the authentication mode for user privilege level switch:
To do… Use the command…
Enter system view system-view —
Set the authentication mode for
user privilege level switch
super authentication-mode { local
| scheme } *
Remarks
Optional
local by default.
• In non-FIPS mode:
super password [ level
Configure the password for user
privilege level switch
user-level] [ hash ] { cipher |
simple } password
• In FIPS mode:
super password [ level
user-level ] { cipher | simple }
password
Required if the authentication
mode is set to local.
By default, no privilege level switch
password is configured.
19
Page 27
CAUTION:
g
• If no user privilege level is specified when you configure the password for switching the user privilege
level with the super password command, the user privilege level defaults to 3.
• Whether you specify the simple keyword or the cipher keyword, the password is saved to the
configuration file in cipher text.
• If the user logs in from the AUX user interface (the console port), the user can switch the privilege level
to a higher level even if the authentication mode is local and no password for user privile
is configured.
Switching the user privilege level
Follow the step to switch the user privilege level:
e level switch
To do… Use the command…
Switch the user privilege level super [ level ]
Remarks
Required
When logging in to the switch, a
user has a user privilege level,
which depends on user interface or
authentication user level.
Available in user view.
When you switch the user privilege level, the information you need to provide varies with combinations
of the user interface authentication mode and the super authentication mode.
Table 6 Information input for user privilege level switch
User interface
authentication
mode
none/password
User privilege level
switch
authentication
mode
local
local scheme
Information input for the
first authentication mode
Local user privilege level
switch password (configured
on the switch)
Local user privilege level
switch password
Information input after the
authentication mode changes
—
Username and password for
privilege level switch (configured
on the AAA server)
scheme
scheme local
local
scheme
local scheme
Username and password for
privilege level switch
Username and password for
privilege level switch
Local user privilege level
switch password
Local user privilege level
switch password
20
—
Local user privilege level switch
password
—
Password for privilege level
switch (configured on the AAA
server). The system uses the
username used for logging in as
the privilege level switch
username.
Page 28
User interface
g
g
g
authentication
mode
CAUTION:
User privilege level
switch
authentication
mode
scheme
scheme local
Information input for the
first authentication mode
Password for privilege level
switch (configured on the
AAA server). The system uses
the username used for
logging in as the privilege
level switch username.
Password for privilege level
switch (configured on the
AAA server). The system uses
the username used for
logging in as the privilege
level switch username.
Information input after the
authentication mode changes
—
Local user privilege level switch
password
• When the authentication mode is set to local, configure the local password before switching to a hi
user privilege level.
• When the authentication mode is set to scheme, configure AAA related parameters before switching to
a higher user privilege level.
her
• The privilege level switch fails after three (for scheme authentication) or five (for local authentication)
consecutive unsuccessful password attempts.
• In scheme authentication mode, a user who fails to provide the correct password durin
attempts must wait 15 minutes before trying again. Trying again before the 15-minute period elapses
restores the wait timer to 15 minutes and restarts the timer.
• For more information about user interface authentication, see "Login methods."
Modifying the level of a command
All the commands in a view default to different levels. The administrator can change the default level of
a command to a lower level or a higher level as needed.
Follow these steps to modify the command level:
To do… Use the command…
Enter system view system-view —
Configure the command level in a
specified view
CAUTION:
HP recommends that you use the default command level or modify the command level under the
of professional staff. An improper change of the command level may bring inconvenience to your
maintenance and operation, or even potential security problems.
command-privilege level level view
view command
five consecutive
Remarks
Required
See Table 5 for the default settings.
uidance
21
Page 29
Saving the current configuration
On the device, you can input the save command in any view to save all the submitted and executed
commands into the configuration file. Commands saved in the configuration file can survive a reboot.
The save command does not take effect on one-time commands, such as display commands, which
display specified information, and the reset commands, which clear specified information. The one-time
commands executed are never saved.
Displaying and maintaining CLI
To do… Use the command… Remarks
Display defined command aliases
and the corresponding commands
Display the clipboard information
display command-alias [ | { begin
| exclude | include }
regular-expression ]
display clipboard [ | { begin |
exclude | include }
regular-expression ]
Available in any view
Available in any view
22
Page 30
g
Login methods
This chapter includes these sections:
• Login methods
• User interface overview
FIPS compliance
The device supports the FIPS mode that complies with NIST FIPS 140-2 requirements. Support for features,
commands, and parameters might differ in FIPS mode and non-FIPS mode. For more information about
FIPS mode, see the Security Configuration Guide.
Login methods
You can log in to the switch by using the following methods.
Table 7 Login methods
Lo
in method Default state
CLI login
Logging in
through the
console p
Logging in
through telnet
Logging in
through SSH
ort
By default, you can log in to a device through the console port, the
authentication mode is None (no username or password required),
and the user privilege level is 3.
By default, you cannot log in to a device through telnet. To do so, log
in to the device through the console port, and complete the following
configuration:
• Enable the telnet function.
• Configure the IP address of the VLAN interface, and make sure that
• Configure the authentication mode of VTY login users (password
• Configure the user privilege level of VTY login users (0 by default).
NOTE:
Telnet is not supported in FIPS mode.
By default, you cannot log in to a device through SSH. To do so, log
in to the device through the console port, and complete the following
configuration:
• Enable the SSH function and configure SSH attributes.
• Configure the IP address of the VLAN interface, and make sure that
• Configure the authentication mode of VTY login users as scheme
• Configure the user privilege level of VTY login users (0 by default).
your device and the telnet client can reach each other (by default,
the device does not have an IP address.).
by default).
your device and the SSH client can reach each other (by default,
your device does not have an IP address.).
(password by default).
23
Page 31
Login method Default state
Web login
NMS login
Logging in
through modems
By default, you can log in to a device through modems. The default
user privilege level of modem login users is 3.
By default, you cannot log in to a device through web. To do so, log
in to the device through the console port, and complete the following
configuration:
• Configure the IP address of the VLAN interface (by default, your
device does not have an IP address.).
• Configure a username and password for web login (not configured
by default).
• Configure the user privilege level for web login (not configured by
default).
• Configure the Telnet service type for web login (not configured by
default).
NOTE:
HTTP is not supported in FIPS mode.
By default, you cannot log in to a device through an network
management station (NMS). To do so, log in to the device through the
console port, and complete the following configuration:
• Configure the IP address of the VLAN interface, and make sure the
device and the NMS can reach each other (by default, your device
does not have an IP address.).
• Configure SNMP basic parameters.
User interface overview
User interface, also called "line", allows you to manage and monitor sessions between the terminal and
device when you log in to the device through the console port directly, or through Telnet or SSH.
One user interface corresponds to one user interface view where you can configure a set of parameters,
such as whether to authenticate users at login, whether to redirect the requests to another device, and the
user privilege level after login. When the user logs in through a user interface, the parameters set for the
user interface apply.
The system supports the following CLI configuration methods:
• Local configuration via the console port
• Local/Remote configuration through Telnet or SSH
The methods correspond to the following user interfaces.
• AUX user interface: Used to manage and monitor users that log in via the Console port. The type of
the Console port is EIA/TIA-232 DTE.
• VTY (virtual type terminal) user interface: Used to manage and monitor users that log in via VTY. A
VTY port used for Telnet or SSH access.
Users and user interfaces
Only one user can use a user interface at a time. The configuration made in a user interface view applies
to any login user. For example, if user A uses the console port to log in, the configuration in the AUX user
24
Page 32
inter face view applies to user A; if user A logs in throu gh VTY 1, the configuration in VTY 1 user interface
view applies to user A.
A device can be equipped with one AUX user interface and 16 VTY user interfaces. These user interfaces
do not associate with specific users. When a user initiates a connection request, the system automatically
assigns an idle user interface with the smallest number to the user based on the login method. During the
login, the configuration in the user interface view takes effect. The user interface varies depending on the
login method and the login time.
Numbering user interfaces
User interfaces can be numbered by using absolute numbering or relative numbering.
Absolute numbering
Absolute numbering identifies a user interface or a group of different types of user interfaces. The
specified user interfaces are numbered from number 0 with a step of 1 and in the sequence of AUX, and
VTY user interfaces. You can use the display user-interface command without any parameters to view
supported user interfaces and their absolute numbers.
Relative numbering
Relative numbering allows you to specify a user interface or a group of user interfaces of a specific type.
The number format is "user interface type + number". The following rules of relative numbering apply:
• AUX user interfaces are numbered from 0 in the ascending order, with a step of 1.
• VTY user interfaces are numbered from 0 in the ascending order, with a step of 1.
25
Page 33
CLI login
This chapter includes these sections:
• Overview
• Logging in through the console port
• Logging in through telnet
• Logging in through SSH
• Logging in through modems
• Displaying and maintaining CLI login
Overview
The CLI enables you to interact with a device by typing text commands. At the CLI, you can instruct your
device to perform a given task by typing a text command and then pressing Enter to submit it to your
device. Compared with the graphical user interface (GUI), where you can use a mouse to perform
configuration, the CLI allows you to input more information in one command line.
You can log in to the device at the CLI through the console port, telnet, SSH, or modem.
• By default, you can log in to a device through the console port without any authentication, which
introduces security problems.
• By default, you cannot log in to a device through telnet, SSH, so you cannot remotely manage and
maintain the device.
Therefore, you need to perform configurations to increase device security and manageability.
FIPS compliance
The device supports the FIPS mode that complies with NIST FIPS 140-2 requirements. Support for features,
commands, and parameters might differ in FIPS mode and non-FIPS mode. For more information about
FIPS mode, see the Security Configuration Guide.
Logging in through the console port
Logging in through the console port is the most common login method, and is also the first step to
configure other login methods.
By default, you can log in to a device through its console port only. After logging in to the device through
the console port, you can configure other login methods.
This section includes:
• Configuration requirements
• Login procedure
• Console login authentication modes
• Configuring none authentication for console login
• Configuring password authentication for console login
26
Page 34
j
g
W
• Configuring scheme authentication for console login
• Configuring common settings for console login (optional)
Configuration requirements
The following table shows the configuration requirements for console port login.
Ob
ect Requirements
Device No configuration requirement
Run the hyper terminal program.
Terminal
Configure the hyper terminal attributes.
The port properties of the hyper terminal must be the same as the default settings of the console port
shown in the following table.
Settin
Default
Bits per second 9,600 bps
Flow control None
Parity None
Stop bits 1
Data bits 8
Login procedure
1. As shown in Figure 4, use the console cable shipped with the device to connect the PC and the
device. Plug the DB-9 connector of the console cable into the serial port of the PC, and plug the
RJ-45 connector into the console port of your device.
Figure 4 Connect the device and PC through a console cable
ARNING!
Identify interfaces to avoid connection errors.
NOTE:
The serial port of a PC does not support hot-swap, so do not plug or unplug the console cable into or from
the PC when your device is powered on. To connect the PC to the device, first plug the DB-9 connector of
the console cable into the PC, and then plug the RJ-45 connector of the console cable into your device. To
disconnect the PC from the device, first unplug the RJ-45 connector and then the DB-9 connector.
2. Launch a terminal emulation program (such as HyperTerminal in Windows XP/Windows 2000).
The following takes the HyperTerminal of Windows XP as an example. Select a serial port to be
connected to the device, and set terminal parameters as follows: set Bits per second to 9600, Data bits to 8, Parity to None, Stop bits to 1, and Flow control to None, as shown in Figure 5
through Figure 7.
27
Page 35
g
W
NOTE:
On Windows 2003 Server operating system, you need to add the HyperTerminal pro
ram first, and then
log in to and manage the device as described in this document. On Windows 2008 Server, Windows 7,
indows Vista, or some other operating system, you need to obtain a third party terminal control
program first, and follow the user guide or online help of that program to log in to the device.
Figure 5 Connection description
Figure 6 Specify the serial port used to establish the connection
28
Page 36
Figure 7 Set the properties of the serial port
3. Turn on the device. You are prompted to press Enter if the device successfully completes the
power-on self test (POST). A prompt such as <HP> appears after you press Enter.
4. Execute commands to configure the device or check the running status of the device. To get help,
type ?.
Console login authentication modes
The following authentication modes are available for console port login: none, password, and scheme.
•none—requires no username and password at the next login through the console port. This mode
is insecure.
•password—requires password authentication at the next login through the console port. Keep your
password.
•scheme—requires username and password authentication at the next login through the console
port. Authentication falls into local authentication and remote authentication. To use local
authentication, configure a local user and related parameters. To use remote authentication,
configure the username and password on the remote authentication server. For more information
about authentication modes and parameters, see the Security Configuration Guide.
The following table lists console port login configurations for different authentication modes:
Authenticat
ion mode
None Configure not to authenticate users
Configuration Remarks
For more information, see
"Configuring none
authentication f
login."
or console
Password Configure to authenticate users by using the local password
29
For more information, see
Page 37
A
Authenticat
ion mode
Scheme
Configuration Remarks
"Configuring password
Set the local password
Configure the authentication scheme
Remote AAA
authentication
Select an
authentication
scheme
Local
authentication
Configure a
RADIUS/HWTACAC
S scheme
Configure the AAA
scheme used by the
domain
Configure the
username and
password on the
AAA server
Configure the
authentication
username and
password
Configure the AAA
scheme used by the
domain as local
authentication for console
login."
For more information, see
"Configuring scheme
authentication for console
login."
NOTE:
newly configured authentication mode does not take effect unless you exit and enter the CLI again.
Configuring none authentication for console login
NOTE:
This feature is not supported in FIPS mode.
Configuration prerequisites
You have logged in to the device.
By default, you can log in to the device through the console port without authentication and have user
privilege level 3 after login. For information about logging in to the device with the default configuration,
see "Configuration requirements."
Configuration procedure
Follow these steps to configure none authentication for console login:
To do… Use the command… Remarks
Enter system view system-view —
Enter AUX user interface view
user-interface aux first-number
[ last-number ]
30
—
Page 38
To do… Use the command… Remarks
Required
Specify the none authentication
mode
authentication-mode none
By default, you can log in to the
device through the console port
without authentication, and have
user privilege level 3 after login.
Configure common settings for
AUX user interface view
—
Optional
See "Configuring common settings
onsole login (optional)."
for c
After the configuration, the next time you log in to the device through the console port, you are prompted
to press enter. A prompt such as <HP> appears after you press Enter.
Configuring password authentication for console login
NOTE:
This feature is not supported in FIPS mode.
Configuration prerequisites
You have logged in to the device.
By default, you can log in to the device through the console port without authentication and have user
privilege level 3 after login. For information about logging in to the device with the default configuration,
see "Configuration requirements."
Configuration procedure
Follow these steps to configure password authentication for console login:
To do… Use the command…
Enter system view system-view —
Enter AUX user interface view
Configure the authentication mode
as local password authentication
Set the local password
Configure common settings for
AUX user interface view
By default, you can log in to the
device through the console port
without authentication and have
user privilege level 3 after login.
Required
By default, no local password is
set.
Optional
See "Configuring common settings
for console login (optional)."
When you log in to the device through the console port after the configuration, you are prompted to enter
a login password. A prompt such as <HP> appears after you input the password and press Enter.
31
Page 39
Configuring scheme authentication for console login
Configuration prerequisites
You have logged in to the device.
By default, you can log in to the device through the console port without authentication and have user
privilege level 3 after login. For information about logging in to the device with the default configuration,
see "Configuration requirements."
Configuration procedure
Follow these steps to configure scheme authentication for console login:
To do… Use the command…
Enter system view system-view —
Enter AUX user interface view
Specify the scheme
authentication mode
user-interface aux first-number
[ last-number ]
authentication-mode scheme
Remarks
—
Required
Whether local, RADIUS, or
HWTACACS authentication is
adopted depends on the configured
AAA scheme.
By default, users that log in through
the console port are not
authenticated.
depends on the user privilege
level. A user is authorized a
command level not higher than
the user privilege level. With
command authorization
enabled, the command level for
a login user is determined by
both the user privilege level and
AAA authorization. If a user
executes a command of the
corresponding command level,
the authorization server checks
whether the command is
authorized. If yes, the command
can be executed.
authorization, configure the AAA
authorization server. After you
enable command authorization,
only commands authorized by
the AAA authorization server can
be executed.
32
Page 40
To do… Use the command…
Enable command accounting command accounting
Remarks
Optional
• By default, command accounting
is disabled. The accounting
server does not record the
commands executed by users.
• Command accounting allows the
HWTACACS server to record all
the commands executed by
users, regardless of command
execution results. This helps
control and monitor user
operations on the device. If
command accounting is enabled
and command authorization is
not enabled, every executed
command is recorded on the
HWTACACS server. If both
command accounting and
command authorization are
enabled, only the authorized and
executed commands are
recorded on the HWTACACS
server.
• Configure the AAA accounting
server before enabling command
accounting.
Return to system view quit —
Enter the ISP
domain view
Apply the
specified AAA
scheme to the
domain
Configure
the
authentica
tion mode
Exit to system view quit
Create a local user and enter
local user view
domain domain-name
authentication default
{ hwtacacs-scheme
hwtacacs-scheme-name [ local ] |
local | none | radius-scheme
radius-scheme-name [ local ] }
local-user user-name
Optional
By default, the AAA scheme is local.
If you specify the local AAA scheme,
you need to perform local user
configuration. If you specify an
existing scheme by providing the
radius-scheme-name argument,
perform the following configuration
as well:
• For RADIUS and HWTACACS
• Configure the username and
Required
By default, no local user exists.
configuration, see the Security Configuration Guide.
password on the AAA server.
(For more information about
AAA, see the Security Configuration Guide.)
33
Page 41
To do… Use the command…
Remarks
• In non-FIPS mode:
Set the authentication password
for the local user
Specifies the command level of
the local user
Specify the service type for the
local user
Configure common settings for
AUX user interface view
password [ hash ] { cipher |
simple } password
• In FIPS mode:
password
authorization-attribute level level
service-type terminal
—
Required
Optional
By default, the command level is 0.
Required
By default, no service type is
specified.
Optional
See "Configuring common settings
for console login (optional)."
After you enable command authorization, you need to perform the following configuration to make the
function take effect:
• Create a HWTACACS scheme, and specify the IP address of the authorization server and other
authorization parameters. For more information about AAA, see the Security Configuration Guide.
• Reference the created HWTACACS scheme in the ISP domain. For more information about AAA,
see the Security Configuration Guide.
After you enable command accounting, you need to perform the following configuration to make the
function take effect:
• Create a HWTACACS scheme, and specify the IP address of the accounting server and other
accounting parameters. For more information about AAA, see the Security Configuration Guide.
• Reference the created HWTACACS scheme in the ISP domain. For more information about AAA,
see the Security Configuration Guide.
When users adopt the scheme mode to log in to the device, the level of the commands that the users can
access depends on the user privilege level defined in the AAA scheme.
•When the AAA scheme is local, the user privilege level is defined by the authorization-attribute
level level command.
• When the AAA scheme is RADIUS or HWTACACS, the user privilege level is configured on the
RADIUS or HWTACACS server.
•For more information about AAA, RADIUS, and HWTACACS, see the Security Configuration
Guide.
When you log in to the device through the console port after the configuration, you are prompted to enter
a login username and password. A prompt such as <HP> appears after you input the password and
username and press Enter.
Configuring common settings for console login (optional)
Follow these steps to configure common settings for console port login
To do… Use the command…
Enter system view system-view —
34
Remarks
Page 42
To do… Use the command…
Enable display of copyright
information
Enter AUX user interface view
Configure the
baud rate
Configure the
parity check mode
Configure the stop
bits
Configure
AUX user
interface
view
properties
Configure the data
bits
copyright-info enable
user-interface aux first-number
[ last-number ]
speed speed-value
parity { even | mark | none | odd
| space }
stopbits { 1 | 1.5 | 2 }
databits { 5 | 6 | 7 | 8 }
Remarks
Optional
Enabled by default.
—
Optional
By default, the transmission rate is
9600 bps.
Transmission rate is the number of
bits that the device transmits to the
terminal per second.
Optional
none by default.
Optional
By default, the stop bits of the
console port is 1.
Stop bits are the last bits transmitted
in data transmission to
unequivocally indicate the end of a
character. The more the bits are, the
slower the transmission is.
Optional
By default, the data bits of the
console port is 8.
Data bits is the number of bits
representing one character. The
setting depends on the contexts to
be transmitted. For example, you
can set it to 7 if standard ASCII
characters are to be sent, and set it
to 8 if extended ASCII characters
are to be sent.
Define a shortcut
key for enabling a
terminal session
Define a shortcut
key for terminating
tasks
Configure the flow
control mode
activation-key character
escape-key { default | character }
flow-control { hardware | none |
software }
35
Optional
By default, you can press Enter to
enable a terminal session.
Optional
By default, you can press Ctrl+C to
terminate a task.
Optional
By default, the value is none
Page 43
To do… Use the command…
Configure the type
of terminal display
Configure the user
privilege level for
login users
terminal type { ansi | vt100 }
user privilege level level
Remarks
Optional
By default, the terminal display type
is ANSI.
The device supports two types of
terminal display: ANSI and VT100.
HP recommends that you set the
display type of both the device and
the client to VT100. If the device and
the client use different display types
(for example, hyper terminal or
Telnet terminal) or both are set to
ANSI, when the total number of
characters of the edited command
line exceeds 80, an anomaly such
as cursor corruption or abnormal
display of the terminal display may
occur on the client.
Optional
By default, the default command
level is 3 for the AUX user interface.
This command is not supported in
FIPS mode.
Optional
By default, the next screen displays
24 lines.
A value of 0 disables the function.
Optional
By default, the buffer saves 10
history commands at most.
Optional
The default idle-timeout is 10
minutes. The system automatically
terminates the user's connection if
no information interaction occurs
between the device and the user
within the idle-timeout time.
Setting idle-timeout to 0 disables the
timer.
CAUTION:
Set the maximum
number of lines on
the next screen.
Set the size of
history command
buffer
Set the idle-timeout
timer
screen-length screen-length
history-command max-size value
idle-timeout minutes[seconds]
The common settings configured for console login take effect immediately. If you configure the common
settings after you log in through the console port, the current connection may be interrupted, so you should
use another login method. After you configure common settings for console login, you need to modify the
settings on the terminal to make them consistent with those on the device.
Logging in through telnet
36
Page 44
j
NOTE:
Telnet is not supported in FIPS mode.
The device supports telnet. You can telnet to the device to remotely manage and maintain it, as shown
in Figure 8.
Figure 8 Telnet login
The following table shows the configuration requirements of telnet login.
Ob
ect Requirements
Configure the IP address of the VLAN interface, and make sure the telnet server
Telnet server
Telnet client
and client can reach each other.
Configure the authentication mode and other settings
Run the telnet client program.
Obtain the IP address of the VLAN interface on the server
By default, the device is enabled with the telnet server and client functions.
• On a device that serves as the telnet client, you can log in to a telnet server to perform operations
on the server.
• On a device that serves as the telnet server, you can configure the authentication mode and user
privilege level for telnet users. By default, you cannot log in to the device through telnet. Before you
can telnet to the device, you need to log in to the device through the console port, enable telnet
server, and configure the authentication mode, user privilege level, and common settings.
This section includes these topics:
• Telnet login authentication modes
• Configuring none authentication for telnet login
• Configuring password authentication for telnet login
• Configuring scheme authentication for telnet login
• Configuring common settings for VTY user interfaces (optional)
• Configuring the device to log in to a telnet server as a telnet client
Telnet login authentication modes
Three authentication modes are available for telnet login: none, password, and scheme.
• none—requires no username and password at the next login through telnet. This mode is insecure.
• password—requires password authentication at the next login through telnet. Keep your password.
If you lose your password, log in to the device through the console port to view or modify the
password.
•scheme—requires username and password authentication at the next login through telnet.
Authentication falls into local authentication and remote authentication. To use local authentication,
configure a local user and related parameters. To use remote authentication, configure the
37
Page 45
username and password on the remote authentication server. For more information about
authentication modes and parameters, see the Security Configuration Guide.
The following table lists telnet login configurations for different authentication modes.
Authentication
mode
None Configure not to authenticate users
Password
Scheme
Configuration Remarks
Configure to authenticate users by using the local
password
Set the local password
Configure the authentication scheme
Remote AAA
authentication
Select an
authenticati
on scheme
Configure a
RADIUS/HWTACAC
S scheme
Configure the AAA
scheme used by the
domain
Configure the
username and
password on the
AAA server
For more information, see
"Configuring none
authentication for telnet
login."
For more information, see
"Configuring password
authentication for telnet
login."
For more information, see
"Configuring scheme
authentication for telnet
login."
Configure the
authentication
Local
authentication
username and
password
Configure the AAA
scheme used by the
domain as local
Configuring none authentication for telnet login
Configuration prerequisites
You have logged in to the device.
By default, you can log in to the device through the console port without authentication and have user
privilege level 3 after login. For information about logging in to the device with the default configuration,
see "Configuration requirements."
Configuration procedure
Follow these steps to configure none authentication for telnet login:
To do… Use the command…
Enter system view system-view —
Remarks
38
Page 46
To do… Use the command…
Enable telnet telnet server enable
Enter one or multiple VTY user
interface views
Specify the none authentication
mode
Configure the command level for
login users on the current user
interfaces
Configure common settings for
VTY user interfaces
user-interface vty first-number
[ last-number ]
authentication-mode none
user privilege level level
—
When you log in to the device through telnet again:
• You enter the VTY user interface, as shown in Figure 9.
• If "A
ll user interfaces are used, please try later!" is displayed, it means the current login users
exceed the maximum number. Please try later.
Remarks
Required
By default, the telnet service is
disenabled.
—
Required
By default, authentication mode for
VTY user interfaces is password.
Required
By default, the default command
level is 0 for VTY user interfaces.
Optional
See "Configuring common settings
for VTY user interfaces (optional)."
Figure 9 Configuration page
Configuring password authentication for telnet login
Configuration prerequisites
You have logged in to the device.
By default, you can log in to the device through the console port without authentication and have user
privilege level 3 after login. For information about logging in to the device with the default configuration,
see "Configuration requirements."
Configuration procedure
Follow these steps to configure password authentication for telnet login:
39
Page 47
To do… Use the command…
Enter system view system-view —
Enable telnet telnet server enable
Enter one or multiple VTY user
interface views
Specify the password
authentication mode
Set the local password
Configure the user privilege level
for login users
Configure common settings for
VTY user interfaces
user-interface vty first-number
[ last-number ]
authentication-mode password
set authentication password { cipher |
simple } password
user privilege level level
—
Remarks
Required
By default, the telnet service is
disenabled.
—
Required
By default, authentication mode
for VTY user interfaces is
password.
Required
By default, no local password is
set.
Required
0 by default.
Optional
See "Configuring common
settings for VTY user interfaces
(optional)."
When you log in to the device through telnet again:
• You are required to enter the login password. A prompt such as <HP> appears after you enter the
correct password and press Enter, as shown in Figure 10.
• If "A
ll user interfaces are used, please try later!" is displayed, it means the number of current
concurrent login users exceed the maximum. Please try later.
Figure 10 Configuration page
Configuring scheme authentication for telnet login
Configuration prerequisites
You have logged in to the device.
40
Page 48
By default, you can log in to the device through the console port without authentication and have user
privilege level 3 after login. For information about logging in to the device with the default configuration,
see "Configuration requirements."
Configuration procedure
Follow these steps to configure scheme authentication for telnet login
To do… Use the command…
Enter system view system-view —
Enable telnet telnet server enable
Enter one or multiple VTY user
interface views
Specify the scheme authentication
mode
user-interface vty first-number
[ last-number ]
authentication-mode scheme
Remarks
Required
By default, the telnet service is
disabled.
—
Required
Whether local, RADIUS, or
HWTACACS authentication is
adopted depends on the
configured AAA scheme.
depends on the user privilege
level. A user is authorized a
command level not higher than
the user privilege level. With
command authorization
enabled, the command level for
a login user is determined by
both the user privilege level and
AAA authorization. If a user
executes a command of the
corresponding command level,
the authorization server checks
whether the command is
authorized. If yes, the command
can be executed.
authorization, configure the
AAA authorization server. After
you enable command
authorization, only commands
authorized by the AAA
authorization server can be
executed.
41
Page 49
To do… Use the command…
Enable command accounting command accounting
Remarks
Optional
• By default, command
accounting is disabled. The
accounting server does not
record the commands executed
by users.
• Command accounting allows
the HWTACACS server to
record all executed commands
that are supported by the
device, regardless of the
command execution result. This
helps control and monitor user
operations on the device. If
command accounting is
enabled and command
authorization is not enabled,
every executed command is
recorded on the HWTACACS
server. If both command
accounting and command
authorization are enabled, only
the authorized and executed
commands are recorded on the
HWTACACS server.
• Configure the AAA accounting
server before enabling
command accounting.
Exit to system view quit —
Configure
the
authentic
ation
mode
Enter the default ISP
domain view
Specify the AAA
scheme to be applied to
the domain
Exit to system view quit
domain domain-name
authentication default
{ hwtacacs-scheme
hwtacacs-scheme-name [ local ]
| local | none | radius-schemeradius-scheme-name [ local ] }
Optional
By default, the AAA scheme is
local.
If you specify the local AAA
scheme, perform the configuration
concerning local user as well. If you
specify an existing scheme by
providing the radius-scheme-name
argument, perform the following
configuration as well:
• For RADIUS and HWTACACS
• Configure the username and
Create a local user and enter local
user view
Set the local password
local-user user-name By default, no local user exists.
password { cipher | simple } password
Required
By default, no local password is set.
configuration, see the Security Configuration Guide.
password on the AAA server.
(For more information, see the
Security Configuration Guide.)
42
Page 50
To do… Use the command…
Specifies the command level of the
local user
Specify the service type for the local
user
Exit to system view quit —
Configure common settings for VTY
user interfaces
authorization-attribute level
level
service-type telnet
—
Remarks
Optional
By default, the command level is 0.
Required
By default, no service type is
specified.
Optional
See "Configuring common settings
for VTY user interfaces (optional)."
After you enable command authorization, you need to perform the following configuration to make the
function take effect:
• Create a HWTACACS scheme, and specify the IP address of the authorization server and other
authorization parameters. For more information, see the Security Configuration Guide.
• Reference the created HWTACACS scheme in the ISP domain. For more information, see the
Security Configuration Guide.
After you enable command accounting, you need to perform the following configuration to make the
function take effect:
• Create a HWTACACS scheme, and specify the IP address of the accounting server and other
accounting parameters. For more information, see the Security Configuration Guide.
• Reference the created HWTACACS scheme in the ISP domain. For more information, see the
Security Configuration Guide.
When users adopt the scheme mode to log in to the device, the level of the commands that the users can
access depends on the user privilege level defined in the AAA scheme.
•When the AAA scheme is local, the user privilege level is defined by the authorization-attribute
level level command.
• When the AAA scheme is RADIUS or HWTACACS, the user privilege level is configured on the
RADIUS or HWTACACS server.
For more information about AAA, RADIUS, and HWTACACS, see the Security Configuration Guide.
When you log in to the device through telnet again:
• You are required to enter the login username and password. A prompt such as <HP> appears after
you enter the correct username (for example, admin) and password and press Enter, as shown
Figure 11.
in
• A
fter you enter the correct username and password, if the device prompts you to enter another
password of the specified type, you will be authenticated for the second time. In other words, to
pass authentication, you must enter a correct password as prompted.
• If "All user interfaces are used, please try later!" is displayed, it means the current login users
exceed the maximum number. Please try later.
43
Page 51
Figure 11 Configuration page
Configuring common settings for VTY user interfaces (optional)
Follow these steps to configure common settings for VTY user interfaces:
To do… Use the command…
Enter system view system-view —
Enable display of copyright
information
Enter one or multiple VTY user
interface views
Enable the terminal
service
Enable the current
user interface(s) to
support either Telnet,
SSH, or both of them
User
interface
configuration
Define a shortcut key
for terminating tasks
Configure the type of
terminal display
copyright-info enable
user-interface vty first-number
[ last-number ]
shell
protocol inbound { all | ssh |
telnet }
escape-key { default | character }
terminal type { ansi | vt100 }
Remarks
Optional
Enabled by default.
—
Optional
Enabled by default.
Optional
By default, both protocols are
supported.
The configuration takes effect next
time you log in.
Optional
By default, you can press Ctrl+C to
terminate a task.
Optional
By default, the terminal display
type is ANSI.
Set the maximum
number of lines on the
next screen
screen-length screen-length
44
Optional
By default, the next screen displays
24 lines.
A value of 0 disables the function.
Page 52
To do… Use the command…
Set the size of history
command buffer
Set the idle-timeout
timer
Specify a command
to be automatically
executed when a user
logs in to the current
user interface
history-command max-size
value
idle-timeout minutes[seconds]
auto-execute command
command
Remarks
Optional
By default, the buffer saves 10
history commands.
Optional
The default idle-timeout is 10
minutes for all user interfaces.
The system automatically
terminates the user's connection if
no information interaction occurs
between the device and the user in
timeout time.
Setting idle-timeout to 0 disables
the timer.
Optional
By default, command
auto-execution is disabled.
The system automatically executes
the specified command when a
user logs in to the user interface,
and tears down the user
connection after the command is
executed. If the command triggers
another task, the system does not
tear down the user connection until
the task is completed. A telnet
command is usually specified to
enable the user to automatically
telnet to the specified device.
CAUTION:
The auto-execute command command may disable you from configuring the system through the user
interface to which the command is applied. Use it with caution.
Before executing the auto-execute command command and saving the configuration (by using the save
command), make sure that you can access the device through VTY and AUX user interfaces so that you
can remove the configuration when a problem occurs.
Configuring the device to log in to a telnet server as a telnet
client
Configuration prerequisites
You have logged in to the device.
By default, you can log in to the device through the console port without authentication and have user
privilege level 3 after login. For information about logging in to the device with the default configuration,
see "Configuration requirements."
45
Page 53
j
Figure 12 Log in to another device from the current device
NOTE:
If the telnet client port and the telnet server port that connect them are not in the same subnet, make sure
that the two devices can reach each other.
Configuration procedure
Follow the step below to configure the device to log in to a telnet server as a telnet client:
To do… Use the command…
telnet remote-host [ service-port ]
Configure the device to log in to a
telnet server as a telnet client
[ [ source { interface interface-type
interface-number | ip
ip-address } ] ]
Logging in through SSH
Secure Shell (SSH) offers an approach to log into a remote device securely. By providing encryption and
strong authentication, it protects devices against attacks such as IP spoofing and plain text password
interception. The device supports SSH, and you can log in to the device through SSH to remotely manage
and maintain the device, as shown in Figure 13.
Figure 13 SSH login dia
The following table shows the configuration requirements of SSH login.
Ob
ect Requirements
gram
Remarks
Optional
Available in user view
Configure the IP address of the VLAN interface, and make sure the SSH server
SSH server
SSH client
and client can reach each other.
Configure the authentication mode and other settings.
Run the SSH client program.
Obtain the IP address of the VLAN interface on the server.
By default, the device is enabled with the SSH server and client functions.
• On a device that serves as the SSH client, you can log in to an SSH server to perform operations on
the server.
• On a device that serves as the SSH server, you can configure the authentication mode and user level
for SSH users. By default, password authentication is adopted for SSH login, but no login password
is configured, so you cannot log in to the device through SSH by default. Before you can log in to
46
Page 54
the device through SSH, you need to log in to the device through the console port and configure the
authentication mode, user level, and common settings.
This section includes these topics:
• Configuring the SSH server
• Configuring the SSH client to log in to the SSH server
Configuring the SSH server
Configuration prerequisites
You have logged in to the device, and want to log in to the device through SSH in the future.
By default, you can log in to the device through the console port without authentication and have user
privilege level 3 after login. For information about logging in to the device with the default configuration,
see "Configuration requirements."
Configuration procedure
Follow these steps to configure the device that serves as an SSH server:
To do… Use the command…
Enter system view system-view —
Create local key pair(s) public-key local create { dsa | rsa }
Enable SSH server ssh server enable
Enter one or more VTY user
interface views
Specify the scheme authentication
mode
Enable the current user interface to
support SSH
user-interface vty first-number
[ last-number ]
authentication-mode scheme
protocol inbound { all | ssh |
telnet }
Remarks
Required
By default, no local key pair(s) are
created.
Required
By default, SSH server is disabled.
—
Required
By default, authentication mode for
VTY user interfaces is password.
a login user depends on the
user privilege level. The user
is authorized the command
with the default level not
higher than the user privilege
level. With the command
authorization configured, the
command level for a login
user is determined by both
the user privilege level and
AAA authorization. If a user
executes a command of the
corresponding command
level, the authorization server
checks whether the
command is authorized. If
yes, the command can be
executed.
Enable command accounting command accounting
Optional
• By default, command
accounting is disabled. The
accounting server does not
record the commands executed
by users.
• Command accounting allows
the HWTACACS server to
record all executed commands
that are supported by the
device, regardless of the
command execution result. This
helps control and monitor user
operations on the device. If
command accounting is
enabled and command
authorization is not enabled,
every executed command is
recorded on the HWTACACS
server. If both command
accounting and command
authorization are enabled, only
the authorized and executed
commands are recorded on the
HWTACACS server.
Exit to system view quit —
48
Page 56
To do… Use the command…
Enter the default
ISP domain
view
Apply the
specified AAA
scheme to the
domain
Configure the
authentication
mode
Exit to system
view
Create a local user and enter local
user view
Set the local password
domain domain-name
authentication default
{ hwtacacs-scheme
hwtacacs-scheme-name [ local ] |
local | none | radius-scheme
radius-scheme-name [ local ] }
quit
local-user user-name
password { cipher | simple }
password
Remarks
Optional
By default, the AAA scheme is
local.
If you specify the local AAA
scheme, perform the configuration
concerning local user as well. If
you specify an existing scheme by
providing the radius-scheme-name
argument, perform the following
configuration as well:
• For RADIUS and HWTACACS
configuration, see the Security
Configuration Guide.
• Configure the username and
password on the AAA server.
(For more information, see the
Security Configuration Guide.)
Required
By default, no local user exists.
Required
By default, no local password is
set.
Specifies the command level of the
local user
Specify the service type for the
local user
Return to system view quit —
Create an SSH user, and specify
the authentication mode for the
SSH user
Configure common settings for VTY
user interfaces
authorization-attribute level level
service-type ssh
ssh user username service-type
stelnet authentication-type
{ password | { any |
password-publickey | publickey }
assign publickey keyname }
—
Optional
By default, the command level is 0.
Required
By default, no service type is
specified.
Required
By default, no SSH user exists, and
no authentication mode is
specified.
Optional
See "Configuring common settings
for VTY user interfaces (optional)."
NOTE:
This chapter describes how to configure an SSH client by using password authentication. For more
information about SSH and how to configure an SSH client by using publickey, see the
Configuration Guide
.
Security
After you enable command authorization or command accounting, you need to perform the following
configuration to make the function take effect:
49
Page 57
• Create a HWTACACS scheme, and specify the IP address of the authorization server and other
authorization parameters.
• Reference the created HWTACACS scheme in the ISP domain.
For more information, see the Security Configuration Guide.
When users adopt the scheme mode to log in to the device, the level of the commands that the users can
access depends on the user privilege level defined in the AAA scheme.
•When the AAA scheme is local, the user privilege level is defined by the authorization-attribute
level level command.
• When the AAA scheme is RADIUS or HWTACACS, the user privilege level is configured on the
RADIUS or HWTACACS server.
•For more information about AAA, RADIUS, and HWTACACS, see the Security Configuration
Guide.
Configuring the SSH client to log in to the SSH server
Configuration prerequisites
You have logged in to the device.
By default, you can log in to the device through the console port without authentication and have user
privilege level 3 after login. For information about logging in to the device with the default configuration,
see "Configuration requirements."
Figure 14 Log in to anot
NOTE:
If the SSH client and the SSH server are not in the same subnet, make sure that the two devices can reach
each other.
Configuration procedure
Follow these steps to configure the SSH client to log in to the SSH server:
To do… Use the command…
Log in to an IPv4 SSH server ssh2 server
Log in to an IPv6 SSH server ssh2 ipv6server
her device from the current device
Remarks
Required
server is the IPv4 address or host
name of the server.
Available in user view
Required
server is the IPv6 address or host
name of the server.
Available in user view
50
Page 58
j
NOTE:
You can configure other settings for the SSH client to work with the SSH server. For more information, see
Security Configuration Guide
the
.
Logging in through modems
The administrator can use two modems to remotely maintain a switch through its Console port over the
Public Switched Telephone Network (PSTN) when the IP network connection is broken.
This section includes these topics:
• Configuration requirements
• Login procedure
• Modem login authentication modes
• Configuring none authentication for modem login
• Configuring password authentication for modem login
• Configuring scheme authentication for modem login
• Configuring common settings for modem login (optional)
Configuration requirements
By default, no authentication is needed when you log in through modems, and the default user privilege
level is 3.
To use this method, perform necessary configurations at both the device side and administrator side.
The following table shows the configuration requirements of remote login through the console port by
using modem dial-in:
Ob
ect Requirement
The PC is correctly connected to the modem.
Administrator side
Device side
The modem is connected to a telephone cable that works normally.
The telephone number of the remote modem connected to the Console port of the
remote switch is obtained.
The Console port is correctly connected to the modem.
Configurations have been configured on the modem.
The modem is connected to a telephone cable that works properly.
Authentication configuration has been completed on the remote switch.
Login procedure
1. Set up a configuration environment as shown in Figure 15: connect the serial port of the PC and
the Console port of the device to a modem respectively.
51
Page 59
g
g
W
NOTE:
Figure 15 Set up a configuration terminal
2. Configuration on the administrator side
The PC and the modem are correctly connected, the modem is connected to a telephone cable, and the
telephone number of the remote modem connected to the Console port of the remote switch is obtained.
On the device:
• The baud rate of the Console port is lower than the transmission rate of the modem. Otherwise, packets
may be lost.
• The parity check mode, stop bits, and data bits of the Console port adopt the default settings.
3. Perform the following configurations on the modem that is directly connected to the device:
AT&F ----------------------- Restore the factory defaults
ATS0=1 ----------------------- Configure auto-answer on first ring
AT&D ----------------------- Ignore data Terminal Ready signals
AT&K0 ----------------------- Disable local flow control
AT&R1 ----------------------- Ignore Data Flow Control signals
AT&S0 ----------------------- Force DSR to remain on
ATEQ1&W ----------------------- Disable the modem from response to commands and save the
configuration
To verify your configuration, enter AT&V to show the configuration results.
NOTE:
The confi
see the user guide of your modem.
4. Launch a terminal emulation utility (such as HyperTerminal in Windows XP/Windows 2000),
uration commands and the output for different modems may be different. For more information,
create a new connection (the telephone number is the number of the modem connected to the
device).
NOTE:
On Windows 2003 Server operatin
system, you need to add the HyperTerminal program first, and then
log in to and manage the device as described in this document. On Windows 2008 Server, Windows 7,
indows Vista, or some other operating system, you need to obtain a third party terminal control
program first, and follow the user guide or online help of that program to log in to the device.
5. Dial the destination number on the PC to establish a connection with the device, as shown in Figure
16 through Figure 18.
52
Page 60
Figure 16 Connection Description
Figure 17 Enter the phone number
Figure 18 Dial the number
53
Page 61
Character string CONNECT9600 is displayed on the terminal. Then a prompt such as <HP>
6.
appears when you press Enter.
7. Execute commands to configure the device or check the running status of the device. To get help,
type ?.
NOTE:
• To terminate the connection between the PC and device, execute the ATH command on the terminal to
terminate the connection between the PC and modem. If you cannot execute the command on the
terminal, input AT+ + + and then press Enter. When you are prompted OK, execute the ATH command,
and the connection is terminated if OK is displayed. You can also terminal the connection between the
PC and device by clicking on the hyper terminal window.
• Do not close the hyper terminal directly. Otherwise, the remote modem may be always online, and you
will fail to dial in at the next time.
Modem login authentication modes
The following authentication modes are available for modem dial-in login: none, password, and
scheme.
•none—requires no username and password at the next login through modems. This mode is
insecure.
•password—requires password authentication at the next login through the console port. Keep your
password.
•scheme—requires username and password authentication at the next login through the console
port. Authentication falls into local authentication and remote authentication. To use local
authentication, configure a local user and related parameters. To use remote authentication,
configure the username and password on the remote authentication server. For more information
about authentication modes and parameters, see the Security Configuration Guide.
The following table lists modem login configurations for different authentication modes:
Authentication
mode
None Configure not to authenticate users
Password
Scheme
Configuration Remarks
For more information,
see "Configuring none
authentication for
modem login."
Configure to authenticate users by using the local password
Set the local password
Configure the authentication scheme
Select an
authentic
ation
scheme
Remote AAA
authentication
Configure a
RADIUS/HWTACACS
scheme
Configure the AAA scheme
used by the domain
For more information,
see "Configuring
password
authentication f
modem login."
For more information,
see "Configuring
scheme authentication
for modem login."
or
54
Page 62
Authentication
mode
Configuration Remarks
Configure the username and
password on the AAA server
Configure the authentication
username and password
Local authentication
Configure the AAA scheme
used by the domain as local
NOTE:
Modem login authentication changes do not take effect until you exit the CLI and log in again.
Configuring none authentication for modem login
NOTE:
This feature is not supported in FIPS mode.
Configuration prerequisites
You have logged in to the device.
By default, you can log in to the device through the console port without authentication and have user
privilege level 3 after login. For information about logging in to the device with the default configuration,
see "Configuration requirements."
Configuration procedure
Follow these steps to configure none authentication for modem login:
To do… Use the command…
Enter system view system-view —
Enter one or more AUX user
interface views
Specify the none authentication
mode
Configuring common settings for
modem login
When you log in to the device through modems after the configuration, you are prompted to press Enter.
A prompt such as <HP> appears after you press Enter.
user-interface aux first-number
[ last-number ]
authentication-mode none
—
Remarks
—
Required
By default, users that log in through
the console port are not
authenticated.
Optional
See "Configuring common settings
for modem login (optional)."
Configuring password authentication for modem login
NOTE:
This feature is not supported in FIPS mode.
55
Page 63
Configuration prerequisites
You have logged in to the device.
By default, you can log in to the device through the console port without authentication and have user
privilege level 3 after login. For information about logging in to the device with the default configuration,
see "Configuration requirements."
Configuration procedure
Follow these steps to configure password authentication for modem login:
By default, the authentication
mode is none for modem users
Required
By default, no local password is
set.
Optional
For more information, see
"Configuring common settings for
modem login (optional)."
When you log in to the d evic e th ro ugh m odems aft er the configuration, you are prompted to enter a login
password. A prompt such as <HP> appears after you input the password and press Enter.
Configuring scheme authentication for modem login
Configuration prerequisites
You have logged in to the device.
By default, you can log in to the device through the console port without authentication and have user
privilege level 3 after login. For information about logging in to the device with the default configuration,
see "Configuration requirements."
Configuration procedure
Follow these steps to configure scheme authentication for modem login:
To do… Use the command…
Enter system view system-view —
Enter AUX user interface
view
user-interface aux first-number
[ last-number ]
56
Remarks
—
Page 64
To do… Use the command…
Specify the scheme
authentication mode
Enable command
authorization
authentication-mode scheme
command authorization
Remarks
Required
Whether local, RADIUS, or
HWTACACS authentication is
adopted depends on the configured
AAA scheme.
By default, the authentication mode
is none for modem users
Optional
• By default, command
authorization is not enabled.
• By default, command level for a
login user depends on the user
privilege level. The user is
authorized the command with the
default level not higher than the
user privilege level. With the
command authorization
configured, the command level
for a login user is determined by
both the user privilege level and
AAA authorization. If a user
executes a command of the
corresponding command level,
the authorization server checks
whether the command is
authorized. If yes, the command
can be executed.
• Before enabling command
authorization, configure the AAA
authorization server. After you
enable command authorization,
only commands authorized by
the AAA authorization server can
be executed.
57
Page 65
To do… Use the command…
Enable command
accounting
command accounting
Remarks
Optional
• By default, command accounting
is disabled. The accounting
server does not record the
commands executed by users.
• Command accounting allows the
HWTACACS server to record all
executed commands that are
supported by the device,
regardless of the command
execution result. This helps
control and monitor user
operations on the device. If
command accounting is enabled
and command authorization is
not enabled, every executed
command is recorded on the
HWTACACS server. If both
command accounting and
command authorization are
enabled, only the authorized and
executed commands are
recorded on the HWTACACS
server.
• Configure the AAA accounting
server before enabling command
accounting.
Exit to system view quit —
Enter the
default ISP
domain view
Apply the
specified
Configure
the
authentica
tion mode
Create a local user and
enter local user view
AAA scheme
to the domain
Return to
system view
domain domain-name
authentication default
{ hwtacacs-scheme
hwtacacs-scheme-name [ local ] | local |
none | radius-scheme
radius-scheme-name [ local ] }
quit
local-user user-name
Optional
By default, the AAA scheme is local.
If you specify the local AAA scheme,
perform the configuration
concerning local user as well. If you
specify an existing scheme by
providing the radius-scheme-name
argument, perform the following
configuration as well:
• For RADIUS and HWTACACS
• Configure the username and
Required
By default, no local user exists.
configuration, see the Security Configuration Guide.
password on the AAA server.
(For more information, see the
Security Configuration Guide.)
58
Page 66
To do… Use the command…
Remarks
• In non-FIPS mode:
Set the authentication
password for the local user
Specifies the command
level of the local user
Specify the service type for
the local user
Configuring common
settings for modem login
password [ hash ] { cipher | simple } password
• In FIPS mode:
password
authorization-attribute level level
service-type terminal
—
Required
Optional
By default, the command level is 0.
Required
By default, no service type is
specified.
Optional
See "Configuring common settings
for modem login (optional)."
After you enable command authorization, you need to perform the following configuration to make the
function take effect:
• Create a HWTACACS scheme, and specify the IP address of the authorization server and other
authorization parameters. For more information, see the Security Configuration Guide.
• Reference the created HWTACACS scheme in the ISP domain. For more information, see the
Security Configuration Guide.
After you enable command accounting, you need to perform the following configuration to make the
function take effect:
• Create a HWTACACS scheme, and specify the IP address of the accounting server and other
accounting parameters. For more information, see the Security Configuration Guide.
• Reference the created HWTACACS scheme in the ISP domain. For more information, see the
Security Configuration Guide.
When users adopt the scheme mode to log in to the device, the level of the commands that the users can
access depends on the user privilege level defined in the AAA scheme.
•When the AAA scheme is local, the user privilege level is defined by the authorization-attribute
level level command.
• When the AAA scheme is RADIUS or HWTACACS, the user privilege level is configured on the
RADIUS or HWTACACS server.
For more information about AAA, RADIUS, and HWTACACS, see the Security Configuration Guide.
When you log in to the d evic e th ro ugh m odems aft er the configuration, you are prompted to enter a login
username and password. A prompt such as <HP> appears after you input the password and username
and press Enter.
Configuring common settings for modem login (optional)
Follow these steps to configure common settings for modem login:
To do… Use the command…
Enter system view system-view —
59
Remarks
Page 67
To do… Use the command…
Enable display of copyright
information
Enter one or more AUX user
interface views
Configure the
baud rate
Configure the
parity check mode
Configure the stop
bits
Configure
AUX user
interface
properties
Configure the data
bits
copyright-info enable
user-interface aux first-number
[ last-number ]
speed speed-value
parity { even | mark | none | odd
| space }
stopbits { 1 | 1.5 | 2 }
databits { 5 | 6 | 7 | 8 }
Remarks
Optional
Enabled by default.
—
Optional
By default ,the baud rate is 9600
bps.
Transmission rate is the number of
bits that the device transmits to the
terminal per second.
Optional
By default, the parity check mode is
none, which means no check bit.
Optional
By default, the stop bits of the
console port is 1.
Stop bits are the last bits transmitted
in data transmission to
unequivocally indicate the end of a
character. The more the bits are, the
slower the transmission is.
Optional
By default, the data bits is 8.
Data bits is the number of bits
representing one character. The
setting depends on the contexts to
be transmitted. For example, you
can set it to 7 if standard ASCII
characters are to be sent, and set it
to 8 if extended ASCII characters
are to be sent.
Define a shortcut
key for starting a
session
Define a shortcut
key for terminating
tasks
Configure the flow
control mode
activation-key character
escape-key { default | character }
flow-control { hardware | none |
software }
60
Optional
By default, you can press Enter to
start a session.
Optional
By default, you can press Ctrl+C to
terminate a task.
Optional
By default, the value is none
Page 68
g
g
To do… Use the command…
Configure the type
of terminal display
Configure the user
privilege level for
login users
terminal type { ansi | vt100 }
user privilege level level
Remarks
Optional
By default, the terminal display type
is ANSI.
The device supports two types of
terminal display: ANSI and VT100.
HP recommends that you set the
display type of both the device and
the client to VT100. If the device and
the client use different display types
(for example, hyper terminal or
Telnet terminal) or both are set to
ANSI, when the total number of
characters of the edited command
line exceeds 80, an anomaly such
as cursor corruption or abnormal
display of the terminal display may
occur on the client.
Optional
3 by default.
This command is not supported in
FIPS mode.
Set the maximum
CAUTION:
number of lines on
the next screen
Set the size of the
history command
buffer
Set the idle-timeout
timer
screen-length screen-length
history-command max-size value
idle-timeout minutes[seconds]
• The common settings configured for Console login take effect immediately. If you confi
Optional
By default, the next screen displays
24 lines at most.
A value of 0 disables the function.
Optional
By default, the buffer saves 10
history commands at most.
Optional
The default idle-timeout is 10
minutes. The system automatically
terminates the user's connection if
no information interaction occurs
between the device and the user
within the idle-timeout time.
Setting idle-timeout to 0 disables the
timer.
ure the common
settings after you log in through the Console port, the current connection may be interrupted. To avoid
this problem, use another login method. After you configure the common settings for Console lo
need to modify the settings on the terminal to make them consistent with those on the device.
in, you
• The baud rate of the Console port must be lower than the transmission rate of the modem. Otherwise,
packets may be lost.
61
Page 69
Displaying and maintaining CLI login
To do… Use the command…
Display the source IP
address/interface specified for
Telnet packets
Display information about the user
interfaces that are being used
Displays information about all user
interfaces that the device supports
Display user interface information
Release a specified user interface
display telnet client configuration
[ | { begin | exclude | include } regular-expression ]
display users [ | { begin | exclude
| include } regular-expression ]
display users all [ | { begin |
exclude | include } regular-expression ]
display user-interface [ num1 |
{ aux | vty } num2 ] [ summary ] [ |
{ begin | exclude | include }
regular-expression ]
free user-interface { num1 | { aux |
vty } num2 }
Remarks
Available in any view
Available in any view
Available in any view
Available in any view
Available in user view
Multiple users can log in to the
system to simultaneously configure
the device. In some circumstances,
when the administrator wants to
make configurations without
interruption from the users that
have logged in through other user
interfaces, the administrator can
execute the command to release
the connections established on the
specified user interfaces.
You cannot use this command to
release the connection that you are
using.
Lock the current user interface lock
Send messages to the specified
user interfaces
send { all | num1 | { aux | vty }
num2 }
Available in user view
By default, the current user
interface is not locked.
This command is not supported in
FIPS mode.
Available in user view
62
Page 70
j
Web login
This chapter includes these sections:
• Web login overview
• Configuring HTTP login
• Configuring HTTPS login
• Displaying and maintaining web login
• Web login example
Web login overview
The device provides a built-in web server. It enables you to log in to the web interface of the device from
a PC. Web login is disabled by default.
To enable web login, log in to the device via the console port, and perform the following configuration:
• Enable HTTP or HTTPS service
• Configure the IP address of the VLAN interface
• Configure a username and password
The device supports the following web login methods:
• HTTP login: The Hypertext Transfer Protocol (HTTP) is used for transferring web page information
across the Internet. It is an application-layer protocol in the TCP/IP protocol suite. The
connection-oriented Transport Control Protocol (TCP) is adopted at the transport layer. The device
supports HTTP 1.0.
• HTTPS login: The Secure HTTP (HTTPS) refers to the HTTP protocol that supports the Security Socket
Layer (SSL) protocol. HTTPS uses SSL to encrypt the data exchanged between the HTTPS client and
the server to ensure data security and integrity. You can define a certificate attribute-based access
control policy to allow legal clients to access the device securely and prohibit illegal clients.
The following table shows the configuration requirements of web login.
Ob
ect Requirements
Configure the IP address of the VLAN interface
Make sure the device and the PC can reach each other
Device
PC
Configuring HTTP login
Required to use one approach
Configuring HTTPS login
Install a web browser
Obtain the IP address of the VLAN interface of the device
63
Page 71
FIPS compliance
The device supports the FIPS mode that complies with NIST FIPS 140-2 requirements. Support for features,
commands, and parameters might differ in FIPS mode and non-FIPS mode. For more information about
FIPS mode, see Security Configuration Guide.
Unless otherwise noted, devices in the configuration examples are operating in non-FIPS mode.
HTTP is not supported in FIPS mode.
Configuring HTTP login
NOTE:
This feature is not supported in FIPS mode.
Follow these steps to configure HTTP login:
To do… Use the command…
Enter system view system-view —
Enable the HTTP service ip http enable
Configure the HTTP service port
number
Associate the HTTP service with an
ACL
Set the web user connection
timeout time
Set the web log buffer size web logbuffer size pieces Optional
Create a local user and enter local
user view
ip http port port-number
ip http acl acl-number
web idle-timeout minutesOptional
local-user user-name
Remarks
Required
Enabled by default.
Optional
80 by default.
If you execute the command
multiple times, the last one takes
effect.
Optional
By default, the HTTP service is not
associated with any ACL.
Associating the HTTP service with
an ACL enables the device to allow
only clients permitted by the ACL to
access the device.
Required
By default, no local user is
configured.
Configure a password for the local
user
Specify the command level of the
local user
password { cipher | simple }
password
authorization-attribute level level
64
Required
By default, no password is
configured for the local user.
Required
No command level is configured
for the local user.
Page 72
To do… Use the command…
Specify the telnet service type for
the local user
Exit to system view quit —
Create a VLAN interface and enter
its view
Assign an IP address and subnet
mask to the VLAN interface
service-type telnet
interface vlan-interface
vlan-interface-id
ip address ip-address { mask |
mask-length }
Configuring HTTPS login
Follow these steps to configure HTTPS login:
To do… Use the command…
Enter system view system-view —
Remarks
Required
By default, no service type is
configured for the local user.
Required
If the VLAN interface already
exists, the command enters its
view.
Required
By default, no IP address is
assigned to the VLAN interface.
Remarks
Configure PKI and SSL related
features
Associate the HTTPS service
with an SSL server policy
—
ip https ssl-server-policy
policy-name
Required
By default, PKI and SSL are not configured.
• For more information about PKI, see the
Security Configuration Guide.
• For more information about SSL, see the
Security Configuration Guide.
Required
By default, the HTTPS service is not associated
with any SSL server policy.
• If you disable the HTTPS service, the system
automatically de-associates the HTTPS
service from the SSL service policy. Before
re-enabling the HTTPS service, associate
the HTTPS service with an SSL server policy
first.
• Any changes to the SSL server policy
associated with the HTTP service that is
enabled do not take effect.
65
Page 73
To do… Use the command…
Enable the HTTPS service ip https enable
Associate the HTTPS service
with a certificate
attribute-based access control
policy
ip https certificate
access-control-policy
policy-name
Remarks
Required
Disabled by default.
Enabling the HTTPS service triggers an SSL
handshake negotiation process. During the
process, if the local certificate of the device
exists, the SSL negotiation succeeds, and the
HTTPS service can be started normally. If no
local certificate exists, a certificate application
process will be triggered by the SSL
negotiation. Because the application process
takes much time, the SSL negotiation often fails
and the HTTPS service cannot be started
normally. In that case, you need to execute the
ip https enable command multiple times to
start the HTTPS service.
Optional
By default, the HTTPS service is not associated
with any certificate-based attribute access
control policy.
• Associating the HTTPS service with a
certificate-based attribute access control
policy enables the device to control the
access rights of clients.
• You must configure the client-verify enable
command in the associated SSL server
policy. If not, no clients can log in to the
device.
• The associated SSL server policy must
contain at least one permit rule.
Otherwise, no clients can log in to the
device.
• For more information about certificate
attribute-based access control policies, see
the Security Configuration Guide.
Configure the port number of
the HTTPS service
Associate the HTTPS service
with an ACL
Set the web user connection
timeout time
Set the web log buffer size web logbuffer size pieces Optional
Create a local user and enter
local user view
ip https port port-number
ip https acl acl-number
web idle-timeout minutesOptional
local-user user-name
66
Optional
443 by default.
Required
By default, the HTTPS service is not associated
with any ACL.
Associating the HTTPS service with an ACL
enables the device to allow only clients
permitted by the ACL to access the device.
Required
By default, no local user is configured.
Page 74
To do… Use the command…
Configure a password for the
local user
Specify the command level of
the local user
Specify the telnet service type
for the local user
Exit to system view quit —
Create a VLAN interface and
enter its view
Assign an IP address and
subnet mask to the VLAN
interface
password { cipher | simple }
password
authorization-attribute level
level
service-type telnet
interface vlan-interface
vlan-interface-id
ip address ip-address { mask
| mask-length }
Remarks
Required
By default, no password is configured for the
local user.
Required
By default, no command level is configured for
the local user.
Required
By default, no service type is configured for
the local user.
Required
If the VLAN interface already exists, the
command enters its view.
Required
By default, no IP address is assigned to the
VLAN interface.
Displaying and maintaining web login
To do… Use the command… Remarks
Display information about web
users
Display HTTP state information
Display HTTPS state information
display web users [ | { begin | exclude |
include } regular-expression ]
display ip http [ | { begin | exclude |
include } regular-expression ]
display ip https [ | { begin | exclude |
include } regular-expression ]
Web login example
HTTP login example
NOTE:
This example is not supported in FIPS mode.
Network requirements
Available in any view
Available in any view
Not supported in FIPS
mode
Available in any view
As shown in Figure 19, the PC is connected to the device over an IP network. The IP address of the Device
is 192.168.0.58/24.
67
Page 75
Figure 19 Network diagram for configuring HTTP login
Configuration procedure
1. Configuration on the device
# Log in to the device via the console port and configure the IP address of VLAN 1 of the device. VLAN
1 is the default VLAN.
# Create a local user named admin, and set the password to admin for the user. Specify the telnet service
type for the local user, and set the command level to 3 for this user.
# On the PC, run the web browser. Enter the IP address of the device in the address bar, 192.168.0.58
in this example. The web login page appears, as shown in Figure 20.
Figure 20 Web login page
68
Page 76
# Type the user name, password, verify code, select English, and click Login. The homepage appears.
After login, you can configure device settings through the web interface.
HTTPS login example
Network requirements
As shown in Figure 21, to prevent unauthorized users from accessing the Device, configure HTTPS login
as follows:
• Configure the Device as the HTTPS server, and request a certificate for it.
• The Host acts as the HTTPS client. Request a certificate for it.
In this example, Windows Server acts as the CA. Install Simple Certificate Enrollment Protocol (SCEP)
add-on on the CA. The name of the CA that issues certificates to the Device and Host is new-ca.
Before performing the following configuration, make sure that the Device, Host, and CA can reach each
other.
Figure 21 Network diagram for configuring HTTPS login
Configuration procedure
1. Configure the device that acts as the HTTPS server
# Configure a PKI entity, configure the common name of the entity as http-server1, and the FQDN of the
entity as ssl.security.com.
# Create a PKI domain, specify the trusted CA as new-ca, the URL of the server for certificate request as
http://10.1.2.2/certsrv/mscep/mscep.dll, authority for certificate request as RA, and the entity for certificate request as en.
[Device] pki domain 1
[Device-pki-domain-1] ca identifier new-ca
[Device-pki-domain-1] certificate request url http://10.1.2.2/certsrv/mscep/mscep.dll
[Device-pki-domain-1] certificate request from ra
[Device-pki-domain-1] certificate request entity en
# Specify the RSA key pair with the purpose general, the name hostkey.
[Device-pki-domain-1] public-key rsa general name hostkey
[Device-pki-domain-1] quit
69
Page 77
# Create RSA local key pairs.
[Device] public-key loc al create rsa
# Retrieve the CA certificate from the certificate issuing server.
[Device] pki retrieval-certificate ca domain 1
# Request a local certificate from a CA through SCEP for the device.
[Device] pki request-certificate domain 1
# Create an SSL server policy myssl, specify PKI domain 1 for the SSL server policy, and enable
certificate-based SSL client authentication.
# Create a certificate attribute group mygroup1, and configure a certificate attribute rule, specifying that
the Distinguished Name (DN) in the subject name includes the string of new-ca.
# Create a certificate attribute-based access control policy myacp. Configure a certificate
attribute-based access control rule, specifying that a certificate is considered valid when it matches an
attribute rule in certificate attribute group myacp.
2. Configure the host that acts as the HTTPS client
On the host, run the IE browser. In the address bar, enter http://10.1.2.2/certsrv and request a certificate
for the host as prompted.
3. Verify the configuration
Enter htt ps :// 10 .1.1.1 in the address bar, and select the certificate issued by new-ca. Then the web login
page of the Device appears. On the login page, type the username usera, and password 123 to enter
the web management page.
70
Page 78
g
NOTE:
• To log in to the web interface through HTTPS, enter the URL address starting with https://. To lo
the web interface through HTTP, enter the URL address starting with http://.
• For more information about PKI configuration commands, see the
• For more information about the public-key local create rsa command, see the
Reference
• For more information about SSL configuration commands, see the
.
Security Command Reference
Security Command
Security Command Reference
in to
.
.
71
Page 79
j
NMS login
This chapter includes these sections:
• NMS login overview
• Configuring NMS login
• NMS login example
NMS login overview
A Network Management Station (NMS) runs the SNMP client software. It offers a user-friendly interface
to facilitate network management. An agent is a program that resides in the device. It receives and
handles requests from the NMS. An NMS is a manager in an SNMP enabled network, whereas agents
are managed by the NMS. The NMS and agents exchange information through the SNMP protocol. The
device supports multiple NMS programs, such as iMC.
By default, you cannot log in to the device through NMS. To enable NMS login, log in to the device via
the console port and make the configurations described in the following table.
The following table shows the configuration requirements of NMS login.
Ob
ect Requirements
Configure the IP address of the VLAN interface
Device
NMS Configure the NMS. For more information, see the manual of your NMS
Make sure the device and the NMS can reach each other
Configure SNMP settings
Configuring NMS login
Connect the Ethernet port of the PC to an Ethernet port of VLAN 1 of the device, as shown in Figure 22.
Make sure the PC and VLAN 1 interface can reach each other.
Figure 22 Network diagram for configuring NMS login
Follow these steps to configure SNMPv3 settings:
To do… Use the command…
Enter system view system-view —
72
Remarks
Page 80
To do… Use the command…
Enable SNMP agent snmp-agent
snmp-agent group v3 group-name
Configure an SNMP group
and specify its access right
You can enable SNMP agent
with this command or any
command that begins with
snmp-agent.
Optional
By default, the MIB view
name is ViewDefault and
OID is 1.
Required
Use either approach.
The direction configuration
approach is for SNMPv1 or
SNMPv2C. The community
name configured on the
NMS should be consistent
with the username configured
on the agent.
The indirect configuration
approach is for SNMPv3.
73
Page 81
t
NOTE:
The device supports three SNMP versions: SNMPv1, SNMPv2c and SNMPv3. For more information abou
SNMP, see the
Network Management and Monitoring Configuration Guide
NMS login example
In this example, iMC is used as the NMS.
1. Configuration on the device
# Assign 1.1.1.1/24 for the IP address of device. Make sure the device and the NMS can reach each other.
(Configuration steps are omitted.)
# Enter system view.
<Sysname> system-view
# Enable the SNMP agent.
[Sysname] snmp-agent
# Configure an SNMP group.
[Sysname] snmp-agent group v3 managev3group read-view test write-view test
On the PC, start the browser. In the address bar, enter http://192.168.3.104:8080/imc, where
192.168.3.104 is the IP address of the iMC.
Type the username and password, and then click Login. The iMC homepage appears.
Log in to the iMC and configure SNMP settings for the iMC to find the device. After the device is found,
you can manage and maintain the device through the iMC. For example, query device information or
configure device parameters.
The SNMP settings on the iMC must be the same as those configured on the device. If not, the device
cannot be found or managed by the iMC. See the iMC manuals for more information.
Click Help in the upper right corner of each configuration page to get corresponding help information.
74
Page 82
g
User login control
This chapter includes these sections:
• User login control overview
• Configuring login control over telnet users
• Configuring source IP-based login control over NMS users
• Configuring source IP-based login control over web users
User login control overview
The device provides the following login control methods:
Lo
in Through Login control methods
ACL used
Configuring source IP-based login c
Configuring source and destination IP-based login control
Telnet
NMS
Web Configuring source IP-based login control over web users Basic ACL
over telnet users
Configuring source MAC-based login control over telnet
users
Configuring source IP-based login control over NMS users Basic ACL
ontrol over telnet users Basic ACL
Advanced ACL
Ethernet frame header ACL
FIPS compliance
The device supports the FIPS mode that complies with NIST FIPS 140-2 requirements. Support for features,
commands, and parameters might differ in FIPS mode and non-FIPS mode. For more information about
FIPS mode, see the Security Configuration Guide.
Unless otherwise noted, devices in the configuration examples are operating in non-FIPS mode.
Configuring login control over telnet users
NOTE:
This feature is not supported in FIPS mode.
Configuration preparation
Before configuration, determine the permitted or denied source IP addresses, source MAC addresses,
and destination IP addresses.
75
Page 83
Configuring source IP-based login control over telnet users
Because basic ACLs match the source IP addresses of packets, you can use basic ACLs to implement
source IP-based login control over telnet users. Basic ACLs are numbered from 2000 to 2999. For more
information about ACL, see the ACL and QoS Configuration Guide.
Follow these steps to configure source IP-based login control over telnet users:
To do… Use the command…
Enter system view system-view —
Create a basic ACL and enter its
view, or enter the view of an
existing basic ACL
Configure rules for this ACL
Exit the basic ACL view
Enter user interface view
Use the ACL to control user login
by source IP address
Configuring source and destination IP-based login control over
telnet users
Because advanced ACLs can match both source and destination IP addresses of packets, you can use
advanced ACLs to implement source and destination IP-based login control over telnet users. Advanced
ACLs are numbered from 3000 to 3999. For more information about ACL, see the ACL and QoS Configuration Guide.
Follow these steps to configure source and destination IP-based login control over telnet users:
To do… Use the command…
Enter system view system-view —
Create an advanced ACL
and enter its view, or enter
the view of an existing
advanced ACL
Configure rules for the ACL rule [ rule-id ] { permit | deny } rule-string Required
user-interface [ type ] first-number
[ last-number ]
Remarks
Required
By default, no advanced ACL
exists.
—
76
Page 84
To do… Use the command…
Use the ACL to control user
login by source and
destination IP addresses
acl [ ipv6 ] acl-number { inbound |
outbound }
Remarks
Required
inbound: Filters incoming telnet
packets.
outbound: Filters outgoing telnet
packets.
Configuring source MAC-based login control over telnet users
Ethernet frame header ACLs can match the source MAC addresses of packets, so you can use Ethernet
frame header ACLs to implement source MAC-based login control over telnet users. Ethernet frame
header ACLs are numbered from 4000 to 4999. For more information about ACL, see the ACL and QoS Configuration Guide.
Follow these steps to configure source MAC-based login control over telnet users:
To do… Use the command…
Enter system view system-view —
Create an Ethernet frame header
ACL and enter its view
aclnumberacl-number
[ match-order { config | auto } ]
Remarks
Required
By default, no advanced ACL
exists.
Configure rules for the ACL
Exit the advanced ACL view quit —
Enter user interface view
Use the ACL to control user login
by source MAC address
rule [ rule-id ] { permit | deny }
rule-string
user-interface [ type ] first-number
[ last-number ]
aclacl-number inbound
Required
—
Required
inbound: Filters incoming telnet
packets.
NOTE:
The above configuration does not take effect if the telnet client and server are not in the same subnet.
Source MAC-based login control configuration example
Network requirements
As shown in Figure 23, configure an ACL on the Device to permit only incoming telnet packets sourced
from Host A and Host B.
77
Page 85
Figure 23 Network diagram for configuring source MAC-based login control
Configuration procedure
# Configure basic ACL 2000, and configure rule 1 to permit packets sourced from Host B, and rule 2 to
permit packets sourced from Host A.
Configuring source IP-based login control over
NMS users
You can log in to the NMS to remotely manage the devices. SNMP is used for communication between
the NMS and the agent that resides in the device. By using the ACL, you can control SNMP user access
to the device.
Configuration preparation
Before configuration, determine the permitted or denied source IP addresses.
Configuring source IP-based login control over NMS users
Because basic ACLs match the source IP addresses of packets, you can use basic ACLs to implement
source IP-based login control over NMS users. Basic ACLs are numbered from 2000 to 2999. For more
information about ACL, see the ACL and QoS Configuration Guide.
Follow these steps to configure source IP-based login control over NMS users:
To do… Use the command…
Enter system view system-view —
78
Remarks
Page 86
To do… Use the command…
Create a basic ACL and enter its
view, or enter the view of an
existing basic ACL
Configuring source IP-based login control over web
users
You can log i n to the web manag ement page of the device th rough HTTP/HT T PS to remotely m a nage the
devices. By using the ACL, you can control web user access to the device.
Configuration preparation
Before configuration, determine the permitted or denied source IP addresses.
Configuring source IP-based login control over web users
Because basic ACLs match the source IP addresses of packets, you can use basic ACLs to implement
source IP-based login control over web users. Basic ACLs are numbered from 2000 to 2999. For more
information about ACL, see the ACL and QoS Configuration Guide.
Follow these steps to configure source IP-based login control over web users:
To do… Use the command…
Enter system view system-view —
80
Remarks
Page 88
To do… Use the command…
Create a basic ACL and enter its
view, or enter the view of an
existing basic ACL
# Associate the ACL with the HTTPS service so that only web users from Host B are allowed to access the
device.
[Sysname] ip https acl 2030
82
Page 90
FTP configuration
This chapter includes these sections:
• FTP overview
• Configuring the FTP client
• Configuring the FTP server
• Displaying and maintaining FTP
FTP overview
Introduction to FTP
The File Transfer Protocol (FTP) is an application layer protocol for sharing files between server and client
over a TCP/IP network.
FTP uses TCP ports 20 and 21 for file transfer. Port 20 is used to transmit data, and port 21 to transmit
control commands. For more information about FTP basic operations, see RFC 959.
FTP transfers files in the following modes:
• Binary mode: Transfers files as raw data, like .app, .bin, and .btm files.
• ASCII mode: Transfers files as text, like .txt, .bat, and .cfg files.
Operation of FTP
FTP adopts the client/server model. Your device can function either as the client or the server (as shown
in Figure 26).
• When the device serves as the FTP client, use Telnet or an emulation program to log in to the device
from the PC, execute the ftp command to establish a connection from the device (FTP client) to the
PC (FTP server), and then upload/download files to/from the server.
• When the device serves as the FTP server, run the FTP client program on the PC to establish a
connection to the FTP server and upload/download files to/from the server.
Figure 26 Network diagram for FTP
When the device serves as the FTP client, you need to perform the following configuration:
83
Page 91
g
g
Table 8 Configuration when the device serves as the FTP client
Device Confi
Device (FTP client)
PC (FTP server)
uration
Use the ftp command to establish the
connection to the remote FTP server
Enable FTP server on the PC, and
configure the username, password,
user privilege level, and so on.
Remarks
If the remote FTP server supports anonymous
FTP, the device can log in to it directly; if not,
the device must obtain the FTP username and
password first to log in to the remote FTP
server.
—
When the device serves as the FTP server, you need to perform the following configuration:
Table 9 Configuration when the device serves as the FTP server
Device Confi
Device (FTP
server)
uration Remarks
Enable the FTP server function
Configure authentication and
authorization
Disabled by default.
You can use the displayftp-server command to view the
FTP server configuration on the device.
Configure the username, password, and authorized
directory for an FTP user.
The device does not support anonymous FTP for security
reasons. You must set a valid username and password.
By default, authenticated users can access the root
directory of the device.
Configure the FTP server
operating parameters
PC (FTP client)
CAUTION:
Use the FTP client program to log
in to the FTP server.
• Make sure that the FTP server and the FTP client can reach each other before establishing the FTP
connection.
• When you use IE to log in to the device serving as the FTP server, some FTP functions are not available.
This is because multiple connections are established during the login process but the device supports
only one connection at a time.
FIPS compliance
The device supports the FIPS mode that complies with NIST FIPS 140-2 requirements. Support for features,
commands, and parameters might differ in FIPS mode and non-FIPS mode. For more information about
FIPS mode, see the Security Configuration Guide.
FTP is not supported in FIPS mode. Use SFTP for file transfer.
Parameters such as the FTP connection timeout time
You can log in to the FTP server only after you input the
correct FTP username and password.
Configuring the FTP client
84
Page 92
g
NOTE:
Only users with the manage level can use the ftp command to lo
and execute directory and file related commands. However, whether the commands can be executed
successfully depends on the authorizations of the FTP server.
Establishing an FTP connection
Before you can access the FTP server, you must first establish a connection from the FTP client to the FTP
server. You can either use the ftp command to establish the connection directly or use the open command
in FTP client view to establish the connection.
When using the ftp command, you can specify the source interface (such as a loopback ) or source IP
address. The primary IP address of the specified source interface or the specified source IP address is
used as the source IP address of sent FTP packets. The source address of the transmitted packets is
selected following these rules:
• If no source address is specified, the FTP client uses the IP address of the interface determined by the
matched route as the source IP address to communicate with an FTP server.
• If the source address is specified with the ftp client source or ftp command, this source address is
used to communicate with an FTP server.
• If you use the ftp client source command and the ftp command to specify a source address
respectively, the source address specified with the ftp command is used to communicate with an FTP
server.
in to an FTP server, enter FTP client view,
•The source address specified with the ftp client source command is valid for all FTP connections and
the source address specified with the ftp command is valid only for the current FTP connection.
Follow these steps to establish an IPv4 FTP connection:
To do… Use the command…
Enter system view system-view —
Configure the source address of
the FTP client
Exit to system view quit —
Log in to the remote FTP server
directly in user view
Log in to the remote FTP server
indirectly in FTP client view
After the switch serving as the FTP client has established a connection with an FTP server, you can create
or delete folders under the authorized directory of the FTP server. For more information about establishing
an FTP connection, see "Establishing an FTP connection."
Follow these steps to operate the directories on an FTP server:
Remarks
Use either approach.
The ftp ipv6 command is available
in user view; and the open ipv6
command is available in FTP client
view.
To do… Use the command…
Display detailed information about a directory or
file on the remote FTP server
Query a directory or file on the remote FTP server ls [ remotefile [ localfile ] ]Optional
Change the working directory of the remote FTP
server
Exit the current working directory and return to an
upper level directory of the remote FTP server
Display the working directory that is being
accessed
Create a directory on the remote FTP server mkdirdirectoryOptional
Remove the specified working directory on the
remote FTP server
dir [ remotefile [ localfile ] ]Optional
cd { directory | .. | / }Optional
cdup Optional
pwd
rmdir directoryOptional
Operating the files on an FTP server
After the switch serving as the FTP client has established a connection with an FTP server, you can upload
a file to or download a file from the FTP server under the authorized directory of the FTP server by
following these steps. For information about establishing an FTP connection, see "Establishing an FTP
connec
tion."
Remarks
Optional
1. Use the dir or ls command to display the directory and the location of the file on the FTP server.
86
Page 94
Delete useless files for effective use of the storage space.
2.
3. Set the file transfer mode. FTP transmits files in two modes: ASCII and binary. ASCII mode transfers
files as text. Binary mode transfers files as raw data.
4. Use the lcd command to display the local working directory of the FTP client. You can upload the
file under this directory, or save the downloaded file under this directory.
5. Upload or download the file.
Follow these steps to operate the files on an FTP server:
To do… Use the command…
Display detailed information
about a directory or file on the
remote FTP server
Query a directory or file on the
remote FTP server
Delete the specified file on the
remote FTP server permanently
Set the file transfer mode to
ASCII
Set the file transfer mode to
binary
Set the data transmission mode
to passive
Display the local working
directory of the FTP client
dir [ remotefile [ localfile ] ]
ls [ remotefile [ localfile ] ]
delete remotefileOptional
ascii
binary
passive
lcd Optional
Remarks
Optional
The ls command displays the name of a
directory or file only, while the dir
command displays detailed information
such as the file size and creation time.
Optional
The ls command displays the name of a
directory or file only, while the dir
command displays detailed information
such as the file size and creation time.
Optional
ASCII by default.
Optional
ASCII by default.
Optional
Passive by default.
Upload a file to the FTP server put localfile [ remotefile ] Optional
Download a file from the FTP
server
getremotefile [ localfile ]Optional
Using another username to log in to an FTP server
After the switch serving as the FTP client has established a connection with the FTP server, you can use
another username to log in to the FTP server. For more information about establishing an FTP connection,
see "Establishing an FTP connection."
T
his feature allows you t o switch to different user levels without affecting the current FTP c onnection; if you
input an incorrect username or password, the current connection will be terminated, and you must log in
again to access the FTP server.
Follow the step below to use another username to log in to the FTP server:
87
Page 95
To do… Use the command…
Use another username to re-log in after
successfully logging in to the FTP server
userusername [ password ]Optional
Maintaining and debugging an FTP connection
After a switch serving as the FTP client has established a connection with the FTP server, you can perform
the following operations to locate and diagnose problems encountered in an FTP connection. For more
information about establishing an FTP connection, see "Establishing an FTP connection."
To do…
Display the help information of
FTP-related commands supported by the
remote FTP server
Enable information display in a detailed
manner
Enable FTP related debugging when the
switch acts as the FTP client
Use the command…
remotehelp [ protocol-command ]Optional
verbose
debugging
Remarks
Remarks
Optional
Enabled by default
Optional
Disabled by default
Terminating an FTP connection
After the switch serving as the FTP client has established a connection with the FTP server, you can use
any of the following commands to terminate an FTP connection. For more information about establishing
an FTP connection, see "Establishing an FTP connection."
To do… Use the command…
Terminate the connection to the FTP server
without exiting FTP client view
Terminate the connection to the FTP server
without exiting FTP client view
Terminate the connection to the FTP server
and return to user view
Terminate the connection to the FTP server
and return to user view
disconnect
close
bye
quit
FTP client configuration example
Remarks
Optional
Equal to the close command.
Optional
Equal to the disconnect
command.
Optional
Equal to the quit command in
FTP client view.
Optional
Available in FTP client view,
equal to the bye command.
Network requirements
• As shown in Figure 27, use Device as an FTP client and PC as the FTP server. Their IP addresses are
10.2.1.1/16 and 10.1.1.1/16 respectively. Device and PC are reachable to each other.
• Device downloads a boot file from PC for device upgrade, and uploads the configuration file to PC
for backup.
88
Page 96
y
g
• On PC, an FTP user account has been created for the FTP client, with the username being abc and
the password being pwd.
Figure 27 Network diagram for FTPing a boot file from an FTP server
Configuration procedure
CAUTION:
If the available memory space of the device is not enough, use the fixdisk command to clear the memor
or use the delete /unreserved
operations.
file-url
command to delete the files not in use and then perform the followin
# Log in to the server through FTP.
<Sysname> ftp 10.1.1.1
Trying 10.1.1.1 ...
Connected to 10.1.1.1.
220 WFTPD 2.0 service (by Texas Imperial Software) ready for new user
User(10.1.1.1:(none)):abc
331 Give me your password, please
Password:
230 Logged in successfully
# Set the file transfer mode to binary to transmit boot file.
[ftp] binary
200 Type set to I.
# Download the boot file newest.bin from PC to the device.
•Download the boot file newest.bin from PC to the root directory of the storage medium on the
master.
[ftp] get newest.bin
•Download the boot file newest.bin from PC to the root directory of the storage medium of a slave
switch (with member ID of 2).
[ftp] get newest.bin slot2#flash:/newest.bin
# Upload the configuration file config.cfg of the device to the server for backup.
[ftp] ascii
[ftp] put config.cfg back-config.cfg
227 Entering Passive Mode (10,1,1,1,4,2).
125 ASCII mode data connection already open, transfer starting for /config.cfg.
226 Transfer complete.
FTP: 3494 byte(s) sent in 5.646 second(s), 618.00 byte(s)/sec.
89
Page 97
[ftp] bye
# Specify newest.bin as the main boot file to be used at the next startup for all the member devices.
<Sysname> boot-loader file newest.bin slot all main
This command will set the boot file of the specified board. Continue? [Y/N]:y
The specified file will be used as the main boot file at the next reboot on slot 1!
The specified file will be used as the main boot file at the next reboot on slot 2!
# Reboot the device, and the boot file is updated at the system reboot.
<Sysname> reboot
CAUTION:
The boot file used for the next startup must be saved under the root directory of the storage medium. You
can copy or move a file to the root directory of the storage medium. For more information about the
boot-loader command, see
the
Fundamentals Command Reference.
Configuring the FTP server
Configuring FTP server operating parameters
The FTP server uses one of the following modes to update a file when you upload the file (use the put
command) to the FTP server:
• In fast mode, the FTP server starts writing data to the storage medium after a file is transferred to the
memory. This prevents the existing file on the FTP server from being corrupted in the event that
anomaly, power failure for example, occurs during a file transfer.
• In normal mode, the FTP server writes data to the storage medium while receiving data. This means
that any anomaly, power failure for example, during file trans fer might resu lt in fil e corruption on the
FTP server. This mode, however, consumes less memory space than the fast mode.
Follow these steps to configure the FTP server:
To do… Use the command… Remarks
Enter system view system-view —
Enable the FTP server
Use an ACL to control FTP clients'
access to the switch
Configure the idle-timeout timer ftp timeout minutes
ftp server enable
ftp server acl acl-number
Required
Disabled by default.
Optional
By default, no ACL is used to control
FTP clients' access to the switch.
Optional
30 minutes by default.
Within the idle-timeout time, if there is
no information interaction between
the FTP server and client, the
connection between them is
terminated.
Set the file update mode for the FTP
server
ftp update { fast | normal }
90
Optional
Normal update is used by default.
Page 98
g
To do… Use the command… Remarks
Quit to user view quit —
Manually release the FTP
connection established with the
specified username
free ftp user username
Optional
Available in user view
Configuring authentication and authorization on the FTP server
To allow an FTP user to access certain directories on the FTP server, you need to create an account for the
user, authorizing access to the directories and associating the username and password with the account.
The following configuration is used when the FTP server authenticates and authorizes a local FTP user. If
the FTP server needs to authenticate a remote FTP user, you need to configure authentication,
authorization and accounting (AAA) policy instead of the local user. For detailed configuration, see the
Security Command Reference.
In local authentication, the switch checks the input username and password against those configured on
the switch. In remote authentication, the switch sends the input username and password to the remote
authentication server, which then checks whether they are consistent with those configured on the switch.
Follow these steps to configure authentication and authorization for FTP server:
To do… Use the command…
Enter system view system-view —
Create a local user and
enter its view
local-user user-name
Remarks
Required
No local user exists by default, and the system
does not support FTP anonymous user access.
By default, the system does not support
anonymous FTP access, and does not assign
any service. If the FTP service is assigned, the
root directory of the switch is used by default.
Optional
By default, the FTP/SFTP users can access the
root directory of the switch, and the user level
is 0. You can change the default configuration
by using this command.
NOTE:
• For more information about the local-user, password, service-type ftp, and authorization-attribute
commands, see the
Security Command Reference
.
• When the switch serves as the FTP server, if the client is to perform the write operations (upload, delete,
create, and delete for example) on the device's file system, the FTP lo
in users must be level 3 users; if the
client is to perform other operations, for example, read operation, the switch has no restriction on the
user level of the FTP login users.
91
Page 99
FTP server configuration example
Network requirements
• As shown in Figure 28, an IRF virtual device comprises a master and a slave FTP server. The member
ID of the master is 1 and that of the slave switch is 2.
• The IRF virtual device serves as an FTP server, and the PC serves as an FTP client. The IRF virtual
device and the PC are reachable to each other.
• The PC keeps the updated boot file of the IRF virtual device. Use FTP to upgrade the IRF virtual
device and back up the configuration file.
•Set the username to ftp and the password to pwd for the FTP client to log in to the FTP server.
Figure 28 Upgrading using the FTP server
Configuration procedure
CAUTION:
If the available memory space of the master and slave switches is insufficient, use the fixdisk command to
clear the memory or use the delete /unreserved
perform the following operations.
1. Configure the IRF virtual device (FTP Server)
# Create an FTP user account ftp, set its password to pwd and the user privilege level to level 3 (the
manage level). Allow user ftp to access the root directory of the flash on the master, and specify ftp to use
FTP.
# To access the root directory of the storage medium of a slave switch (with the member ID 2), replace
flash:/ with slot2#flash:/ in authorization-attribute work-directory flash:/.
c:\> ftp 1.1.1.1
Connected to 1.1.1.1.
220 FTP service ready.
User(1.1.1.1:(none)):ftp
331 Password required for ftp.
Password:
230 User logged in.
# Download the configuration file config.cfg of the IRF virtual device to the PC for backup.
ftp> get config.cfg back-config.cfg
# Upload the configuration file newest.bin to the root directory of the storage medium on the master.
ftp> put newest.bin
ftp> bye
• You can take the same steps to up
rade configuration file with FTP. When upgrading the configuration
file with FTP, put the new file under the root directory of the storage medium.
• After you finish upgrading the Boot ROM program through FTP, you must execute the bootrom update
command to upgrade the Boot ROM.
3. Upgrade the IRF virtual device
# Copy the boot file newest.bin to the root directory of the storage medium on a slave switch (with the
member ID 2).
<Sysname> copy newest.bin slot2#flash:/
# Specify newest.bin as the main boot file to be used at the next startup for all the member devices.
<Sysname> boot-loader file newest.bin slot all main
This command will set the boot file of the specified board. Continue? [Y/N]:y
The specified file will be used as the main boot file at the next reboot on slot 1!
The specified file will be used as the main boot file at the next reboot on slot 2!
# Reboot the IRF virtual device and the boot file is updated at the system reboot.
<Sysname> reboot
CAUTION:
The boot file used for the next startup must be saved under the root directory of the storage medium. You
can copy or move a file to the root directory of the storage medium. For more information about the
boot-loader command, see
the
Fundamentals Command Reference.
Displaying and maintaining FTP
To do… Use the command…
display ftp client configuration [ |
Display the configuration of the FTP client
Display the configuration of the FTP server
{ begin | exclude | include }
regular-expression ]
display ftp-server [ | { begin | exclude |
include } regular-expression ]
93
Remarks
Available in any view
Available in any view
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.