iTable of Contents1 Logging In to an Ethernet Switch ············································································································1-1Logging In to an Ethernet Switch ············································································································1-1Introduction to the User Interface············································································································1-1Supported User Interfaces ··············································································································1-1User Interface Index ························································································································1-2Common User Interface Configuration····························································································1-22 Logging In Through the Console Port·····································································································2-1Introduction ·············································································································································2-1Logging In Through the Console Port ·····································································································2-1Console Port Login Configuration ···········································································································2-4Common Configuration····················································································································2-4Console Port Login Configurations for Different Authentication Modes··········································2-5Console Port Login Configuration with Authentication Mode Being None··············································2-5Configuration Procedure··················································································································2-5Configuration Example ····················································································································2-7Console Port Login Configuration with Authentication Mode Being Password ······································2-8Configuration Procedure··················································································································2-8Configuration Example ····················································································································2-9Console Port Login Configuration with Authentication Mode Being Scheme ·······································2-10Configuration Procedure················································································································2-10Configuration Example ··················································································································2-123 Logging In Through Telnet/SSH···············································································································3-1Introduction ·············································································································································3-1Common Configuration····················································································································3-2Telnet Configurations for Different Authentication Modes·······························································3-2Telnet Configuration with Authentication Mode Being None ··································································3-3Configuration Procedure··················································································································3-3Configuration Example ····················································································································3-4Telnet Configuration with Authentication Mode Being Password ···························································3-5Configuration Procedure··················································································································3-5Configuration Example ····················································································································3-6Telnet Configuration with Authentication Mode Being Scheme······························································3-7Configuration Procedure··················································································································3-7Configuration Example ····················································································································3-9Telnetting to a Switch····························································································································3-10Telnetting to a Switch from a Terminal··························································································3-10Telnetting to another Switch from the Current Switch···································································3-13Logging In Through SSH ······················································································································3-13