No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>Search

Reminder

To have a better experience, please upgrade your IE browser.

upgrade

Web-based Configuration Guide

AR650, AR1600, and AR6100 V300R003

This document describes how to configure and maintain your routers using the web platform.
Rate and give feedback:
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
Service Management

Service Management

Context

In the TCP/IP protocol suite, the Telnet protocol applies to the application layer. The Telnet protocol provides remote login and virtual terminal functions through networks. Telnet is implemented based on the client/server model. Telnet clients send requests to the Telnet server that provides the Telnet service.

NOTE:

The Telnet protocol poses a security risk, and therefore the STelnet protocol is recommended.

The File Transfer Protocol (FTP) applies to scenarios that do not require high file transfer security. FTP is widely used for version upgrades.

NOTE:

The FTP protocol will bring risk to device security. The SFTP mode is recommended.

Secure Shell Telnet (STelnet) ensures secure Telnet services. STelnet secures client access on a traditional insecure network by authenticating the client and encrypting data bidirectionally.

The Secure File Transfer Protocol (SFTP) secures file transfer on a traditional insecure network by authenticating the client and encrypting data bidirectionally.

After value-added security service is enabled. The device uses security policies to provide deep security defense based on the application layer. It protects users against attacks from various network threats.

After Hypertext Transfer Protocol (HTTP) or Hypertext Transfer Protocol Secure (HTTPS) is enabled, log in to a router functioning as the web server through HTTP or HTTPS to remotely configure and manage the router. Compared to HTTP, HTTPS is more secure.

If you do not perform any operation before the web service times out, the system forcibly logs you out and prompts you to log in to the web platform again when you perform an operation. The default web service timeout period, 10 minutes, is recommended.

Procedure

  • Perform service management.

    1. Choose System Management > System Configuration > Service Management to access the Service Management page, as shown in Figure 17-9.

      Figure 17-9  Service Management page

    2. Set FTP Service to Enabled or Disabled to enable or disable FTP.
    3. Set Telnet Service to Enabled or Disabled to enable or disable Telnet.
    4. Set STelnet Service to Enabled or Disabled to enable or disable STelnet.
    5. Set SFTP Service to Enabled or Disabled to enable or disable SFTP.
    6. Set Value-added security service to Enabled or Disabled to enable or disable value-added security.
    7. Click next to Http Service, and enter a port number in the Port text box.
    8. Set Https Service to Enabled to enable HTTPS.
      • Click next to Https Service.
      • Enter a port number in the Port text box.
      • Enter a management interface number in the Manager port text box.
      • Select an SSL policy in the SSL text box.
    9. Set Web service timeout.
    10. Set Maximum number of online user.
    11. Click Apply.

  • Create a remotely trusted host.

    1. Choose System Management > System Configuration > Service Management.
    2. Click Create in Remote Trust Host IP to create a remotely trusted host, as shown in Figure 17-10.

      Figure 17-10  Creating a remote trust host
    3. Set parameters on the Create Remote Trust Host IP page, as described in Table 17-3.
    4. Click OK.
    Table 17-3  Description of parameters for creating a remotely trusted host
    Parameter Description
    IP Address IP address of the remotely trusted host.
    Description Description of the remotely trusted host.

  • Delete a remotely trusted host.

    1. Choose System Management > System Configuration > Service Management.
    2. Select remotely trusted hosts that you want to delete.
    3. Click Delete in Remote Trust Host IP.

Download
Updated: 2019-04-12

Document ID: EDOC1100041803

Views: 38709

Downloads: 103

Average rating:
This Document Applies to these Products
Related Documents
Related Version
Share
Previous Next