Configuring Cli Login; Cli Overview; User Lines - HP 10500 Series Configuration Manual

Hide thumbs Also See for 10500 Series:
Table of Contents

Advertisement

Configuring CLI login

By default, you can log in to the CLI through the console port. After you log in, you can configure other
login methods, including Telnet and SSH.
To prevent illegal access to the CLI and control user behavior, perform the following tasks as required:
Configure login authentication.
Assign user roles.
Configure command authorization and command accounting.
Use ACLs to filter unauthorized logins.
This chapter describes how to configure and use CLI login methods, including login authentication, user
roles, and common user line settings. For more information about command authorization, command
accounting, and unauthorized access filtering, see

CLI overview

User lines

The device uses user lines (also called user interfaces) to manage CLI sessions and monitor user behavior.
You can configure access control settings, including login authentication and user role, on user lines.
After users are logged in, their actions must be compliant with the settings on the user lines assigned to
them.
Users are assigned different user lines, depending on their login methods, as shown in
Table 9 CLI login method and user line matrix
User line
AUX line
Virtual type terminal (VTY) line
User line assignment
The device automatically assigns user lines to CLI login users, depending on their login methods. Each
user line can be assigned only to one user at a time. If no user line is available, a CLI login attempt will
be rejected.
For a CLI login, the device always picks the lowest numbered user line from the idle user lines available
for the login type. For example, four VTY lines (0 to 3) are configured, of which VTY 0 and VTY 3 are idle.
When a user Telnets to the device, the device assigns VTY 0 to the user, and uses the settings on VTY 0
to authenticate and manage the user.
User line identification
Every user line has an absolute number and a relative number for identification.
"Controlling user access to the
Login method
Console port.
Telnet or SSH.
47
device."
Table
9.

Advertisement

Table of Contents
loading

Table of Contents