HP VPN Firewall Appliances Getting Started Guide
i
Contents
Overview ······································································································································································ 1
F1000-A-EI/F1000-S-EI ···················································································································································· 1
Overview ··································································································································································· 1
Appearance ······························································································································································ 1
F1000-E ·············································································································································································· 2
Overview ··································································································································································· 2
Appearance ······························································································································································ 3
F5000 ················································································································································································ 3
Overview ··································································································································································· 3
Appearance ······························································································································································ 4
F5000-S/F5000-C ···························································································································································· 5
Overview ··································································································································································· 5
Appearance ······························································································································································ 6
VPN firewall modules ······················································································································································· 6
Overview ··································································································································································· 6
Appearance ······························································································································································ 7
20-Gbps VPN firewall modules ······································································································································· 9
Overview ··································································································································································· 9
Appearance ··························································································································································· 10
Application scenarios ···················································································································································· 11
F1000-A-EI/F1000-S-EI application scenarios ··································································································· 11
F1000-E application scenarios ···························································································································· 13
F5000 application scenarios ······························································································································· 14
F5000-S/F5000-C application scenarios ·········································································································· 14
VPN firewall modules application scenarios ······································································································ 16
20-Gbps VPN firewall modules application scenarios ····················································································· 17
Login overview ··························································································································································· 19
Login methods at a glance ············································································································································ 19
CLI user interfaces ·························································································································································· 20
User interface assignment ····································································································································· 20
User interface identification ································································································································· 20
Logging in to the CLI ·················································································································································· 22
Logging in through the console port for the first time ································································································· 22
Configuring console login control settings ·················································································································· 24
Configuring none authentication for console login ··························································································· 25
Configuring password authentication for console login ··················································································· 26
Configuring scheme authentication for console login ······················································································· 26
Configuring common console user interface settings (optional) ······································································· 28
Logging in through Telnet ·············································································································································· 29
Configuring none authentication for Telnet login ······························································································ 31
Configuring password authentication for Telnet login ······················································································ 32
Configuring scheme authentication for Telnet login ·························································································· 32
Configuring common VTY user interface settings (optional) ············································································· 34
Using the device to log in to a Telnet server ······································································································ 36
Logging in through SSH ················································································································································ 36
Configuring the SSH server on the device ·········································································································· 37
Using the device to log in to an SSH server ······································································································· 39
Local login through the AUX port ································································································································· 39