iTable of Contents1 Logging In to an Ethernet Switch ············································································································1-1Logging In to an Ethernet Switch ············································································································1-1Introduction to the User Interface············································································································1-1Supported User Interfaces ··············································································································1-1Relationship Between a User and a User Interface ········································································1-2User Interface Index ························································································································1-2Common User Interface Configuration····························································································1-22 Logging In Through the Console Port·····································································································2-1Introduction ·············································································································································2-1Setting Up a Login Environment for Login Through the Console Port····················································2-1Console Port Login Configuration ···········································································································2-3Common Configuration····················································································································2-3Console Port Login Configurations for Different Authentication Modes ·················································2-5Console Port Login Configuration with Authentication Mode Being None··············································2-6Configuration Procedure··················································································································2-6Configuration Example ····················································································································2-6Console Port Login Configuration with Authentication Mode Being Password ······································2-7Configuration Procedure··················································································································2-7Configuration Example ····················································································································2-8Console Port Login Configuration with Authentication Mode Being Scheme ·········································2-9Configuration Procedure··················································································································2-9Configuration Example ··················································································································2-103 Logging In Through Telnet ·······················································································································3-1Introduction ·············································································································································3-1Common Configuration to Control Telnet Access ···········································································3-1Telnet Configurations for Different Authentication Modes·······························································3-3Telnet Configuration with Authentication Mode Being None ··································································3-4Configuration Procedure··················································································································3-4Configuration Example ····················································································································3-4Telnet Configuration with Authentication Mode Being Password ···························································3-5Configuration Procedure··················································································································3-5Configuration Example ····················································································································3-6Telnet Configuration with Authentication Mode Being Scheme······························································3-7Configuration Procedure··················································································································3-7Configuration Example ····················································································································3-8Telnetting to a Switch······························································································································3-9Telnetting to a Switch from a Terminal····························································································3-9Telnetting to another Switch from the Current Switch···································································3-114 Logging In Using a Modem·······················································································································4-1Introduction ·············································································································································4-1Configuration on the Switch Side············································································································4-1Modem Configuration ······················································································································4-1