User's Manual

AT-9000 Gigabit Ethernet Switch Installation Guide
66
Management Methods
You may use the following methods and tools to manage AT-9000 series
switches:
Local management
Telnet client
Secure Shell (SSH) client
HTTP non-secure and HTTPs secure web browser
SNMPv1, v2c, v3
Local
Management
Local management uses the Console port on the switch. It is commonly
referred to as out-of-band management because the management
sessions are not conducted over your network. Listed here are the
requirements for local management:
A terminal or computer with a terminal emulator program.
The management cable included with the switch.
This management method uses the command line interface (CLI), which
gives you access to all of the features and parameters on the switch. For
instructions on how to start a local management session, refer to “Starting
a Local Management Session” on page 64.
Telnet
Management
The switch has a Telnet server. You may use the server to manage the
unit over your network with the Telnet application protocol. Commonly
referred to as in-band management because it is conducted over the
network, this management method has these requirements:
Your management workstation must have a Telnet client.
The Telnet server on the switch has to be activated. This is the
server’s default setting.
The switch must have an IP address. For instructions on how to
assign the address, refer to the AT-9000 Series Management
Command Line Interface User’s Guide.
Telnet management uses the command line interface, giving you access
to all of the features and parameter settings on the switch. For instructions
on how to start a Telnet management session on the switch, refer to the
AT-9000 Series Management Command Line Interface User’s Guide.
Telnet management sessions are not secure and are vulnerable to
snooping because the packets exchanged between the switch and your
workstation are sent in plain text. The security of the switch may be
jeopardized if an intruder captures the packet containing your user name
and password. For secure remote management, use the SSH protocol.