R3166-R3206-HP High-End Firewalls Getting Started Guide-6PW101

i
Contents
Overview ······································································································································································ 1
Product overview ······························································································································································· 1
Firewall A-F1000-E ··················································································································································· 1
Firewall A-F5000 ······················································································································································ 2
HP firewall modules ················································································································································· 2
Application scenarios ······················································································································································· 4
A-F1000-E application ············································································································································· 4
A-F5000 application ················································································································································ 5
Firewall module application ···································································································································· 6
Login methods ······························································································································································ 7
Login methods ···································································································································································· 7
User interface overview ···················································································································································· 8
Users and user interfaces········································································································································· 9
Numbering user interfaces ······································································································································ 9
CLI login ······································································································································································ 10
Overview ········································································································································································· 10
Logging in through the console port ···························································································································· 10
Introduction ···························································································································································· 10
Configuration requirements ·································································································································· 10
Login procedure ····················································································································································· 11
Console login authentication modes ··················································································································· 14
Configuring none authentication for console login ··························································································· 15
Configuring password authentication for console login ··················································································· 16
Configuring scheme authentication for console login ······················································································· 17
Configuring common settings for console login (optional) ··············································································· 19
Logging in through Telnet ·············································································································································· 22
Introduction ···························································································································································· 22
Telnet login authentication modes ······················································································································· 22
Configuring none authentication for Telnet login ······························································································ 23
Configuring password authentication for Telnet login ······················································································ 24
Configuring scheme authentication for Telnet login ·························································································· 25
Configuring common settings for VTY user interfaces (optional) ······································································ 28
Configuring the device to log in to a Telnet server as a Telnet client ······························································ 30
Logging in through SSH ················································································································································ 31
Introduction ···························································································································································· 31
Configuring the SSH server ·································································································································· 32
Configuring the SSH client to log in to the SSH server ····················································································· 34
Logging in through the AUX port ·································································································································· 35
Introduction ···························································································································································· 35
AUX login authentication modes ························································································································· 35
Configuring none authentication for AUX login ································································································· 36
Configuring password authentication for AUX login ························································································· 37
Configuring scheme authentication for AUX login ···························································································· 38
Configuring common settings for AUX login (optional) ····················································································· 41
Configuration requirements ·································································································································· 42
Login procedure ····················································································································································· 43
Logging in through modems ········································································································································· 46
Introduction ···························································································································································· 46