User's Manual

Table Of Contents
4
Users Manual of GPL-8000
Terminal Configuration ............................................................................................................................ 52
4.2.1.
VTY configuration introduction ....................................................................................................... 52
4.2.2.
Configuration tasks ........................................................................................................................ 52
4.2.2.1.
Relationship between line and interface ........................................................................................ 52
4.2.3.
Monitoring and maintenance ......................................................................................................... 52
4.2.4.
Browsing Logs ............................................................................................................................... 52
4.2.5.
VTY configuration example ............................................................................................................ 53
Remote Monitoring .................................................................................................................................. 54
4.3.1.
Configuring SNMP ......................................................................................................................... 54
4.3.1.1.
Introduction .................................................................................................................................... 54
4.3.1.2.
SNMP configuration tasks.............................................................................................................. 55
4.3.1.3.
Configuration example ................................................................................................................... 59
4.3.2.
RMON configuration ...................................................................................................................... 60
4.3.2.1.
RMON configuration tasks ............................................................................................................. 60
4.3.3.
Configuring PDP ............................................................................................................................ 64
4.3.3.1.
Introduction .................................................................................................................................... 64
4.3.3.2.
PDP configuration tasks................................................................................................................. 64
4.3.3.3.
PDP configuration examples.......................................................................................................... 66
SSH Configuration commands ................................................................................................................ 67
4.4.1.
Introduction .................................................................................................................................... 67
4.4.1.1.
SSH server .................................................................................................................................... 67
4.4.1.2.
SSH client ...................................................................................................................................... 67
4.4.1.3.
Function ......................................................................................................................................... 67
4.4.2.
Configuration Tasks ....................................................................................................................... 67
4.4.2.1.
Configuring the authentication method list ..................................................................................... 67
4.4.2.2.
Configuring the access control list ................................................................................................. 67
4.4.2.3.
Configuring the authentication timeout value ................................................................................. 68
4.4.2.4.
Configuring authentication ............................................................................................................. 68
4.4.2.5.
Enabling SSH server ..................................................................................................................... 68
4.4.3.
SSH server configuration example ................................................................................................ 68
4.4.3.1.
Access control list .......................................................................................................................... 68
4.4.3.2.
Global configuration ....................................................................................................................... 68
Remote Monitoring 70
Chapter 5. ................................................................................................................................................................. 70
Remote Monitoring .................................................................................................................................. 70
5.1.1
SNMP configuration ....................................................................................................................... 70
5.1.2
Overview ........................................................................................................................................ 70
5.1.3
SNMP notification .......................................................................................................................... 70
5.1.4
SNMP tasks ................................................................................................................................... 70
Security Configuration 71
Chapter 6. ................................................................................................................................................................. 71
AAA Configuration .................................................................................................................................. 71
6.1.1
AAA Overview ................................................................................................................................ 71
6.1.2
AAA Configuration Process ........................................................................................................... 73
6.1.3
AAA Authentication Configuration Task List ................................................................................... 74
6.1.4
AAA Authentication Configuration Task.......................................................................................... 74