No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>Search

Reminder

To have a better experience, please upgrade your IE browser.

upgrade

Configuration Guide - Basic Configuration

S7700 and S9700 V200R010C00

This document describes methods to use command line interface and to log in to the device, file operations, and system startup configurations.
Rate and give feedback:
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
CLI Login Method Overview

CLI Login Method Overview

You can manage a device through the CLI or web system.
  • CLI

    After logging in to a device through its console port (serial port) or using Telnet or STelnet, you can run commands to configure and manage the device. In this mode, you must configure a user interface for each login method.

  • Web system

    When a device functions as a server, you can use the web system to log in to the device. The internal web server of the device provides a GUI, on which you can easily manage and maintain the device after login. The web system provides only basic maintenance and management functions. You still need to use the CLI to implement fine-grained management.

    For details about web system configuration, see Web System Login Configuration.

You can log in to a device using one of the CLI methods described in Table 5-1 to configure and manage the device.
Table 5-1  CLI login methods
Login Method Advantages Disadvantages Applicable Scenario Description

Logging In Through the Console Port

A dedicated console cable is used for effective device control.

You cannot remotely log in to a device to maintain it.

You can connect the serial port on a PC to the console port on a switch to implement local management of the switch.
  • When you need to configure a device that is powered on for the first time, log in to the device through the console port.
  • If you cannot remotely log in to a device, you can log in through the console port.
  • If a device fails to start, you can enter the Boot menu through the console port to diagnose the fault or upgrade the device.

Console port login is the basis for other login methods.

By default, you can log in to a device through a console port and has the user level of 15 after login.

Logging In Through Telnet

You can log in to one device using Telnet to remotely manage and maintain several devices without the need to connect each device to a terminal, which facilitates operations.

Data is transmitted using TCP in plain text, which is a potential security risk.

If you need to configure a device remotely, log in to the device using Telnet. Telnet login is typically used with networks that do not require high security.

By default, you cannot log in to a device directly using Telnet. Before using Telnet to log in, you must log in to the device locally through a console port and perform the following configurations:
  • Configure a reachable route between the user terminal and device. (By default, no management IP address is configured on the device.)
  • Enable the Telnet server function and set parameters.
  • Configure a user interface for Telnet login.

Logging In Through STelnet

The Secure Shell (SSH) protocol provides secure remote logins on insecure networks to ensure data integrity and reliability, and secure data transmission.

NOTE:

SSH in this document refers to SSH 2.0 unless otherwise stated.

The configuration is complex.

You can log in to a device using STelnet on networks with high security requirements. STelnet, based on the SSH protocol, provides powerful authentication functions to ensure information security and protect devices against attacks, such as IP spoofing attacks.

By default, you cannot log in to a device directly using STelnet. Before using STelnet to log in, you must log in to the device locally through a console port or remotely log in using Telnet and perform the following configurations:
  • Configure a reachable route between the user terminal and device. (By default, no management IP address is configured on the device.)
  • Enable the SSH server function and set parameters.
  • Configure a user interface for SSH login.
  • Configure an SSH user.
Translation
Download
Updated: 2019-04-18

Document ID: EDOC1000141895

Views: 51749

Downloads: 210

Average rating:
This Document Applies to these Products
Related Documents
Related Version
Share
Previous Next