User guide

OmniSwitch 7700/7800/8800 Switch Management Guide April 2006 iii
Contents
About This Guide ..........................................................................................................xi
Supported Platforms ..........................................................................................................xi
Who Should Read this Manual? ......................................................................................xiii
When Should I Read this Manual? ..................................................................................xiii
What is in this Manual? ...................................................................................................xiii
What is Not in this Manual? ............................................................................................xiii
How is the Information Organized? ................................................................................xiv
Documentation Roadmap ................................................................................................xiv
Related Documentation ...................................................................................................xvi
User Manuals Web Site ..................................................................................................xvii
Technical Support ..........................................................................................................xvii
Chapter 1 Logging Into the Switch ............................................................................................1-1
In This Chapter ................................................................................................................1-1
Login Specifications ........................................................................................................1-2
Login Defaults .................................................................................................................1-2
Quick Steps for Logging Into the Switch ........................................................................1-3
Overview of Switch Login Components .........................................................................1-4
Management Interfaces ............................................................................................1-4
Logging Into the CLI .........................................................................................1-4
Using the WebView Management Tool ............................................................1-5
Using SNMP to Manage the Switch ..................................................................1-5
User Accounts ..........................................................................................................1-5
Using Telnet ....................................................................................................................1-6
Logging Into the Switch Via Telnet .........................................................................1-6
Starting a Telnet Session from the Switch ...............................................................1-6
Using FTP .......................................................................................................................1-7
Using FTP to Log Into the Switch ...........................................................................1-7
Using Secure Shell ..........................................................................................................1-8
Secure Shell Components .........................................................................................1-8
Secure Shell Interface ........................................................................................1-8
Secure Shell File Transfer Protocol ...................................................................1-8
Secure Shell Application Overview .........................................................................1-9
Secure Shell Authentication ...................................................................................1-10
Protocol Identification .....................................................................................1-10
Algorithm and Key Exchange .........................................................................1-10