Network requirements ··········································································································································· 27
Configuration procedure ······································································································································ 28
Verifying the configuration ··································································································································· 29
Network requirements ··········································································································································· 30
Configuration procedure ······································································································································ 30
Verifying the configuration ··································································································································· 32
Troubleshooting RBAC ··················································································································································· 33
Login overview ··························································································································································· 35
Logging in to the CLI ·················································································································································· 40
CLI overview ··································································································································································· 40
CLI user interfaces ················································································································································· 40
Login authentication modes ·································································································································· 41
User roles ······························································································································································· 41
Logging in through Telnet ·············································································································································· 47
Logging in through SSH ················································································································································ 52
Configuring SNMPv3 access ········································································································································ 55
Controlling user access ·············································································································································· 57
Controlling Telnet/SSH logins ······································································································································ 57
Configuration procedures ····································································································································· 57
Configuration example ········································································································································· 57
Controlling SNMP access·············································································································································· 58
Configuration procedure ······································································································································ 58
Configuration example ········································································································································· 59
Configuration procedure ······································································································································ 60
Configuration example ········································································································································· 60
Configuring command accounting ······························································································································· 62
Configuration procedure ······································································································································ 62
Configuration example ········································································································································· 62
Configuring FTP ·························································································································································· 64
Using the device as an FTP server ································································································································ 64
Configuring basic parameters ····························································································································· 64
ii