User Guide
Page 7
... Interface 3-1 Getting Started with the Command Line Interface 3-1 Setting Up the Configuration Environment 3-1 Setting Terminal Parameters 3-2 Logging In to the CLI 3-6 CLI Commands 3-6 initialize 3-6 ipsetup 3-7 password 3-8 ping 3-8 quit 3-9 reboot 3-9 summary 3-10 upgrade 3-11 Configuration Example for Upgrading the Host Software Through the CLI 3-12 i
... Interface 3-1 Getting Started with the Command Line Interface 3-1 Setting Up the Configuration Environment 3-1 Setting Terminal Parameters 3-2 Logging In to the CLI 3-6 CLI Commands 3-6 initialize 3-6 ipsetup 3-7 password 3-8 ping 3-8 quit 3-9 reboot 3-9 summary 3-10 upgrade 3-11 Configuration Example for Upgrading the Host Software Through the CLI 3-12 i
User Guide
Page 9
...status of the device rear panel, as shown in Figure 2-2. Table 2-1 The default Web login information Information needed at login Username Password IP address of the device (VLAN-interface 1) Default value admin None Default IP address of the device, depending on the right ... where the device resides. 1) The device is 255.255.0.0. 2-1 2 Configuration Through the Web Interface Web-Based Network Management Operating Environment 3Com provides the Web-based network management function to the Web interface. Figure 2-1 shows a Web-based network management operating environment. You can ...
...status of the device rear panel, as shown in Figure 2-2. Table 2-1 The default Web login information Information needed at login Username Password IP address of the device (VLAN-interface 1) Default value admin None Default IP address of the device, depending on the right ... where the device resides. 1) The device is 255.255.0.0. 2-1 2 Configuration Through the Web Interface Web-Based Network Management Operating Environment 3Com provides the Web-based network management function to the Web interface. Figure 2-1 shows a Web-based network management operating environment. You can ...
User Guide
Page 10
...IE 5.0 or later), type the IP address http://169.254.147.198 in Figure 2-3. Input the username admin and the verification code, leave the password blank, select the language (English and Chinese are supported at present), and click Login. 2-2 summary Select menu option: IP Method: IP address: Summary... DHCP 10.153.96.86 Subnet mask: Default gateway: 255.255.255.0 0.0.0.0 Example Assuming that the PC and device can log in to the device through...
...IE 5.0 or later), type the IP address http://169.254.147.198 in Figure 2-3. Input the username admin and the verification code, leave the password blank, select the language (English and Chinese are supported at present), and click Login. 2-2 summary Select menu option: IP Method: IP address: Summary... DHCP 10.153.96.86 Subnet mask: Default gateway: 255.255.255.0 0.0.0.0 Example Assuming that the PC and device can log in to the device through...
User Guide
Page 14
..., delete, and enable/disable a port, and clear port statistics. Remove a port mirroring group. Configure Statistics Display, create, modify, and clear RMON statistics. Monitor Super Password Configure a password for collecting traffic statistics on Set an interval for a lower-level user to switch from the current access level to Ethernet ports. Interval Configurati on...
..., delete, and enable/disable a port, and clear port statistics. Remove a port mirroring group. Configure Statistics Display, create, modify, and clear RMON statistics. Monitor Super Password Configure a password for collecting traffic statistics on Set an interval for a lower-level user to switch from the current access level to Ethernet ports. Interval Configurati on...
User Guide
Page 28
... ipsetup { dhcp | ip address ip-address { mask | mask-length } [ default-gateway ip-address ] } Modify the login password of CLI commands on the device ? Displays a list of a user password Download the Boot ROM program or boot file from the upgrade server-address source-filename TFTP server and specify it... to the CLI Interface: Step1 Press Enter. The default user name for first time configuration is admin, no password is invalid, the following commands: To do... Use the command... To logon to be used at the Username prompt. Logging In to the...
... ipsetup { dhcp | ip address ip-address { mask | mask-length } [ default-gateway ip-address ] } Modify the login password of CLI commands on the device ? Displays a list of a user password Download the Boot ROM program or boot file from the upgrade server-address source-filename TFTP server and specify it... to the CLI Interface: Step1 Press Enter. The default user name for first time configuration is admin, no password is invalid, the following commands: To do... Use the command... To logon to be used at the Username prompt. Logging In to the...
User Guide
Page 30
... can enter Ctrl+C to ping a specified destination. Description Use the ping command to terminate a ping operation. Examples # Ping IP address 1.1.2.2. password Change password for user: admin Old password: *** Enter new password: ** Retype password: ** The password has been successfully changed. Examples # Modify the login password of a user. password Syntax password Parameters None Description Use the password command to modify the login...
... can enter Ctrl+C to ping a specified destination. Description Use the ping command to terminate a ping operation. Examples # Ping IP address 1.1.2.2. password Change password for user: admin Old password: *** Enter new password: ** Retype password: ** The password has been successfully changed. Examples # Modify the login password of a user. password Syntax password Parameters None Description Use the password command to modify the login...
User Guide
Page 44
...configuration task list Task Remarks Configuring the master device of a stack Configuring Global Parameters of a slave device, you must ensure that the username, password, and access right you used to log on to the master device are the same with those configured on the slave device; By default, ... pool for a stack and no stack is established. otherwise, you cannot log into a slave device, you must ensure that the username, password, and access right you used to log on to the master device are the same with those configured on the slave device; otherwise, the...
...configuration task list Task Remarks Configuring the master device of a stack Configuring Global Parameters of a slave device, you must ensure that the username, password, and access right you used to log on to the master device are the same with those configured on the slave device; By default, ... pool for a stack and no stack is established. otherwise, you cannot log into a slave device, you must ensure that the username, password, and access right you used to log on to the master device are the same with those configured on the slave device; otherwise, the...
User Guide
Page 101
Table of Contents 1 User Management 1-1 Overview 1-1 Users 1-1 Creating a User 1-1 Setting the Super Password 1-2 Switching the User Access Level to the Management Level 1-3 i
Table of Contents 1 User Management 1-1 Overview 1-1 Users 1-1 Creating a User 1-1 Setting the Super Password 1-2 Switching the User Access Level to the Management Level 1-3 i
User Guide
Page 102
1 User Management Overview In the user management part, you can: z Set the username, password, and access level for creating a user. 1-1 Users Creating a User Select Device > Users from the navigation tree, and click the Create tab to the management level. z Set the super password for switching the current Web user level to enter the page for creating local users, as shown in Figure 1-1. z Switch the current Web user access level to the management level. Figure 1-1 Create a user Table 1-1 describes the configuration items for an FTP or Telnet user.
1 User Management Overview In the user management part, you can: z Set the username, password, and access level for creating a user. 1-1 Users Creating a User Select Device > Users from the navigation tree, and click the Create tab to the management level. z Set the super password for switching the current Web user level to enter the page for creating local users, as shown in Figure 1-1. z Switch the current Web user access level to the management level. Figure 1-1 Create a user Table 1-1 describes the configuration items for an FTP or Telnet user.
User Guide
Page 103
... management level. z Visitor: Users of this level can decrypt the password, it considers the password as a ciphertext password; if not, the system considers the password as a ciphertext password; Password Display Mode Set the password display mode. Table 1-1 Configuration items for creating a user Item Description...63 will fail. When the length of different levels can decrypt the password, it considers the password as a plaintext password. Setting the Super Password In this case, the input plain password with a length of the management level can neither access the device...
... management level. z Visitor: Users of this level can decrypt the password, it considers the password as a ciphertext password; if not, the system considers the password as a ciphertext password; Password Display Mode Set the password display mode. Table 1-1 Configuration items for creating a user Item Description...63 will fail. When the length of different levels can decrypt the password, it considers the password as a plaintext password. Setting the Super Password In this case, the input plain password with a length of the management level can neither access the device...
User Guide
Page 104
... z The access level switchover of a user is valid for the user is still the original level. Type the super password and click Login. 1-3 z Simple: The password will be saved in the configuration file in cipher text. Note the following: z Before switching, make sure that the ...when you are recommended to the Web interface, the access level of specifying a super password. When the user re-logs in to use the ciphertext password. z Remove: Remove the current super password. Switching the User Access Level to the Management Level This function is already configured. ...
... z The access level switchover of a user is valid for the user is still the original level. Type the super password and click Login. 1-3 z Simple: The password will be saved in the configuration file in cipher text. Note the following: z Before switching, make sure that the ...when you are recommended to the Web interface, the access level of specifying a super password. When the user re-logs in to use the ciphertext password. z Remove: Remove the current super password. Switching the User Access Level to the Management Level This function is already configured. ...
User Guide
Page 152
...authentication no privacy. z Auth/NoPriv: Authentication without privacy. Select an SNMP group to SNMPv3 configuration task list. Privacy Password Confirm Privacy Password ACL Set the privacy password when the security level is NoAuth/NoPriv, you can select an SNMP group with a specific source IP address, so... to enter the Add Trap Target Host page, as shown in Figure 1-16. 1-11 The confirm privacy password must be the same with the authentication password. Click Add to enter the page as shown in Figure 1-15. Security Level Group Name Authentication Mode Select...
...authentication no privacy. z Auth/NoPriv: Authentication without privacy. Select an SNMP group to SNMPv3 configuration task list. Privacy Password Confirm Privacy Password ACL Set the privacy password when the security level is NoAuth/NoPriv, you can select an SNMP group with a specific source IP address, so... to enter the Add Trap Target Host page, as shown in Figure 1-16. 1-11 The confirm privacy password must be the same with the authentication password. Click Add to enter the page as shown in Figure 1-15. Security Level Group Name Authentication Mode Select...
User Guide
Page 158
... must be consistent with the agent and query and reconfigure values of authentication and privacy. Otherwise, you need to configure the related authentication mode, authentication password, privacy mode, privacy password, and so on the agent is shut down or brought up, the NMS will receive a trap information sent by the agent. 1-17
... must be consistent with the agent and query and reconfigure values of authentication and privacy. Otherwise, you need to configure the related authentication mode, authentication password, privacy mode, privacy password, and so on the agent is shut down or brought up, the NMS will receive a trap information sent by the agent. 1-17
User Guide
Page 332
.... 1 Service Management Overview The service management module provides six types of the device can enable or disable the services as IP spoofing and plain text password interception. In this way, the performance and security of the system can be enhanced, thus secure management of services: FTP, Telnet, SSH, SFTP, HTTP and...
.... 1 Service Management Overview The service management module provides six types of the device can enable or disable the services as IP spoofing and plain text password interception. In this way, the performance and security of the system can be enhanced, thus secure management of services: FTP, Telnet, SSH, SFTP, HTTP and...
User Guide
Page 357
... uncontrolled port is always open to allow data traffic to pass only when it is the most common choice. 1-2 This is in either with the Password Authentication Protocol (PAP) or Challenge Handshake Authentication Protocol (CHAP) attribute, and then transferred to the RADIUS server. Basic Concepts of 802.1X These basic concepts...
... uncontrolled port is always open to allow data traffic to pass only when it is the most common choice. 1-2 This is in either with the Password Authentication Protocol (PAP) or Challenge Handshake Authentication Protocol (CHAP) attribute, and then transferred to the RADIUS server. Basic Concepts of 802.1X These basic concepts...
User Guide
Page 361
.../Identity packet for the username of the client. 3) When the client receives the EAP-Request/Identity packet, it encrypts the password information using a randomly generated challenge, and sends the challenge information through a RADIUS Access-Challenge packet to the device. 6) ...After receiving the EAP-Response/MD5 Challenge packet, the device relays the packet through a RADIUS Access-Request packet to obtain the corresponding password information. Figure 1-8 802.1X authentication procedure in a RADIUS Access-Request packet to the authentication server. 5) When receiving the RADIUS ...
.../Identity packet for the username of the client. 3) When the client receives the EAP-Request/Identity packet, it encrypts the password information using a randomly generated challenge, and sends the challenge information through a RADIUS Access-Challenge packet to the device. 6) ...After receiving the EAP-Response/MD5 Challenge packet, the device relays the packet through a RADIUS Access-Request packet to obtain the corresponding password information. Figure 1-8 802.1X authentication procedure in a RADIUS Access-Request packet to the authentication server. 5) When receiving the RADIUS ...
User Guide
Page 362
... termination mode, EAP packets are identical, the authentication server considers the user valid and sends to the device a RADIUS Access-Accept packet. 10) Upon receiving the RADIUS Access-Accept packet, the device opens the port to grant the access request of RADIUS and transferred to the RADIUS..., you only need to check whether the client is still online. 9) When receiving the RADIUS Access-Request packet, the RADIUS server compares the password information encapsulated in the packet with that the device always knows when a client goes offline. 11) The client can also send an EAPOL-Logoff...
... termination mode, EAP packets are identical, the authentication server considers the user valid and sends to the device a RADIUS Access-Accept packet. 10) Upon receiving the RADIUS Access-Accept packet, the device opens the port to grant the access request of RADIUS and transferred to the RADIUS..., you only need to check whether the client is still online. 9) When receiving the RADIUS Access-Request packet, the RADIUS server compares the password information encapsulated in the packet with that the device always knows when a client goes offline. 11) The client can also send an EAPOL-Logoff...
User Guide
Page 363
... periodically through the port enabled with each other in two cases. Consequently, the device sends the challenge together with the username and encrypted password information from the client, it sends an EAP-Request/Identity packet to guarantee that cannot request for encrypting the user... password information in EAP termination mode Client EAPOL Device EAPOR Server EAPOL-Start EAP-Request / Identity EAP-Response / Identity EAP-Request / MD5 challenge EAP-Response...
... periodically through the port enabled with each other in two cases. Consequently, the device sends the challenge together with the username and encrypted password information from the client, it sends an EAP-Request/Identity packet to guarantee that cannot request for encrypting the user... password information in EAP termination mode Client EAPOL Device EAPOR Server EAPOL-Start EAP-Request / Identity EAP-Response / Identity EAP-Request / MD5 challenge EAP-Response...
User Guide
Page 365
...1X parameters for implementing user identity authentication. z For local authentication, the username and password information must be set to LAN-access. z For remote RADIUS authentication, the username and password information must be configured to work with authorization ACLs, the device will fail if...the service type must be used (that is, local authentication or RADIUS authentication. Before specifying authorization ACLs on a port. 1-10 By default, 802.1X authentication is disabled on the server, you cannot configure an assigned VLAN to carry tags after the VLAN...
...1X parameters for implementing user identity authentication. z For local authentication, the username and password information must be set to LAN-access. z For remote RADIUS authentication, the username and password information must be configured to work with authorization ACLs, the device will fail if...the service type must be used (that is, local authentication or RADIUS authentication. Before specifying authorization ACLs on a port. 1-10 By default, 802.1X authentication is disabled on the server, you cannot configure an assigned VLAN to carry tags after the VLAN...
User Guide
Page 386
... scheme configuration, refer to distinguish the users. In a networking scenario with multiple ISPs, an access device may have different user attributes (such as username and password structure, service type, and rights), you also need to create the RADIUS schemes to configure an accounting server. For the NAS, each user belongs to...
... scheme configuration, refer to distinguish the users. In a networking scenario with multiple ISPs, an access device may have different user attributes (such as username and password structure, service type, and rights), you also need to create the RADIUS schemes to configure an accounting server. For the NAS, each user belongs to...