iTable of Contents1 Logging In to an Ethernet Switch ············································································································1-1Logging In to an Ethernet Switch ············································································································1-1Introduction to the User Interface············································································································1-1Supported User Interfaces ··············································································································1-1Relationship Between a User and a User Interface ········································································1-2User Interface Index ························································································································1-2Common User Interface Configuration····························································································1-22 Logging In Through the Console Port·····································································································2-1Introduction ·············································································································································2-1Setting Up a Login Environment for Login Through the Console Port····················································2-1Console Port Login Configuration ···········································································································2-4Common Configuration····················································································································2-4Console Port Login Configurations for Different Authentication Modes ·················································2-6Console Port Login Configuration with Authentication Mode Being None··············································2-7Configuration Procedure··················································································································2-7Configuration Example ····················································································································2-7Console Port Login Configuration with Authentication Mode Being Password ······································2-8Configuration Procedure··················································································································2-8Configuration Example ····················································································································2-9Console Port Login Configuration with Authentication Mode Being Scheme ·······································2-10Configuration Procedure················································································································2-10Configuration Example ··················································································································2-113 Logging In Through Telnet ·······················································································································3-1Introduction ·············································································································································3-11.1.1 Common Configuration to Control Telnet Access ··································································3-1Telnet Configurations for Different Authentication Modes·······························································3-3Telnet Configuration with Authentication Mode Being None ··································································3-4Configuration Procedure··················································································································3-4Configuration Example ····················································································································3-4Telnet Configuration with Authentication Mode Being Password ···························································3-5Configuration Procedure··················································································································3-5Configuration Example ····················································································································3-6Telnet Configuration with Authentication Mode Being Scheme······························································3-7Configuration Procedure··················································································································3-7Configuration Example ····················································································································3-8Telnetting to a Switch······························································································································3-9Telnetting to a Switch from a Terminal····························································································3-9Telnetting to another Switch from the Current Switch···································································3-114 Logging In Using a Modem·······················································································································4-1Introduction ·············································································································································4-1Configuration on the Switch Side············································································································4-1Modem Configuration ······················································································································4-1