iiConfiguring none authentication for Telnet login ······························································································ 37Configuring password authentication for Telnet login ······················································································ 38Configuring scheme authentication for Telnet login ·························································································· 40Configuring common settings for VTY user interfaces (optional)······································································ 43Configuring the device to log in to a Telnet server as a Telnet client······························································ 44Logging in through SSH ················································································································································ 45Configuring the SSH server·································································································································· 46Configuring the SSH client to log in to the SSH server ····················································································· 49Logging in through modems ········································································································································· 50Configuration requirements·································································································································· 50Login procedure····················································································································································· 50Modem login authentication modes ···················································································································· 54Configuring none authentication for modem login···························································································· 55Configuring password authentication for modem login···················································································· 56Configuring scheme authentication for modem login ······················································································· 57Configuring common settings for modem login (optional)················································································ 60Displaying and maintaining CLI login ························································································································· 62Web login ··································································································································································64Web login overview ······················································································································································ 64Configuring HTTP login ················································································································································· 64Configuring HTTPS login ··············································································································································· 65Displaying and maintaining web login ······················································································································· 67Web login example ······················································································································································· 68HTTP login example ·············································································································································· 68HTTPS login example ············································································································································ 69NMS login ··································································································································································72NMS login overview······················································································································································ 72Configuring NMS login················································································································································· 72NMS login example······················································································································································· 73User login control ·······················································································································································76User login control overview ·········································································································································· 76Configuring login control over Telnet users················································································································· 76Configuration preparation···································································································································· 76Configuring source IP-based login control over Telnet users ············································································ 76Configuring source and destination IP-based login control over Telnet users ················································ 77Configuring source MAC-based login control over Telnet users ······································································ 77Source MAC-based login control configuration example················································································· 78Configuring source IP-based login control over NMS users······················································································ 79Configuration preparation···································································································································· 79Configuring source IP-based login control over NMS users ············································································· 79Source IP-based login control over NMS users configuration example ·························································· 80Configuring source IP-based login control over web users ······················································································· 81Configuration preparation···································································································································· 81Configuring source IP-based login control over web users··············································································· 81Logging off online web users ······························································································································· 81Source IP-based login control over web users configuration example ···························································· 82FTP configuration························································································································································83FTP overview··································································································································································· 83Introduction to FTP ················································································································································· 83FTP operation ························································································································································· 83Configuring the FTP client ············································································································································· 84Establishing an FTP connection···························································································································· 85