3-13Telnetting to another Switch from the Current SwitchYou can Telnet to another switch from the current switch. In this case, the current switch operates as theclient, and the other operates as the server. If the interconnected Ethernet ports of the two switches arein the same LAN segment, make sure the IP addresses of the two management VLAN interfaces towhich the two Ethernet ports belong to are of the same network segment, or the route between the twoVLAN interfaces is available.As shown in Figure 3-8, after Telnetting to a switch (labeled as Telnet client), you can Telnet to anotherswitch (labeled as Telnet server) by executing the telnet command and then configure it.Figure 3-8 Network diagram for Telnetting to another switch from the current switch2) Perform Telnet-related configuration on the switch operating as the Telnet server. Refer to TelnetConfiguration with Authentication Mode Being None, Telnet Configuration with AuthenticationMode Being Password, and Telnet Configuration with Authentication Mode Being Scheme formore.3) Telnet to the switch operating as the Telnet client.4) Execute the following command on the switch operating as the Telnet client: telnet xxxxNote that xxxx is the IP address or the host name of the switch operating as the Telnet server. You canuse the ip host to assign a host name to a switch.5) After successful login, the CLI prompt (such as ) appears. If all the VTY user interfacesof the switch are in use, you will fail to establish the connection and receive the message that says“All user interfaces are used, please try later!”.6) After successfully Telnetting to the switch, you can configure the switch or display the informationabout the switch by executing corresponding commands. You can also type ? at any time for help.Refer to the following chapters for the information about the commands.Logging In Through SSHSecure Shell (SSH) offers an approach to logging into a remote device securely. With encryption andstrong authentication, it protects devices against attacks such as IP spoofing and plain text passwordinterception. For the security features provided by SSH, see SSH Operation.