User's Manual
4
5.2
CONFIGURATION TASKS ........................................................................................................................ 68
5.2.1 Relationship between Line and Interface ................................................................................. 68
5.3 MONITOR AND MAINTENANCE ................................................................................................................ 69
5.4 BROWSING LOGS .................................................................................................................................. 69
5.5 VTY CONFIGURATION EXAMPLE ............................................................................................................ 69
CHAPTER 6 SSH CONFIGURATION COMMANDS ......................................................... 70
6.1 SSH OVERVIEW .................................................................................................................................... 70
6.1.1 SSH Server .............................................................................................................................. 70
6.1.2 SSH Client ................................................................................................................................ 70
6.1.3 Attribute Realization ................................................................................................................. 70
6.2 CONFIGURATION TASKS ........................................................................................................................ 70
6.2.1 Configuring the Authentication Method List ............................................................................. 70
6.2.2 Configuring Access List ............................................................................................................ 70
6.2.3 Configuring the Authentication Timeout Time .......................................................................... 70
6.2.4 Configuring the Authentication Retry Times ............................................................................. 71
6.2.5 Configuring the Login Silence Period ....................................................................................... 71
6.2.6 Enabling Encryption Key Saving Function ............................................................................... 71
6.2.7 Enabling SFTP Function .......................................................................................................... 71
6.2.8 Enabling SSH Server ............................................................................................................... 72
6.3 CONFIGURATION EXAMPLE OF SSH SERVER .......................................................................................... 72
6.3.1 ACL ........................................................................................................................................... 72
6.3.2 Global Configuration ................................................................................................................ 72
CHAPTER 7 NETWORK MANAGEMENT CONFIGURATION ......................................... 73
7.1 SNMP CONFIGURATION ........................................................................................................................ 73
7.1.1 Overview .................................................................................................................................. 73
7.2 SNMP TASKS ...................................................................................................................................... 74
7.3 LLC2 CONFIGURATION TAST ................................................................................................................ 74
7.3.1 Configuring Idle Time Value ..................................................................................................... 74
7.3.2 Configuring the Time Value of Waiting for Acknowledgement ................................................. 75
7.3.3 Configuring Busy Time Value of Remote Terminal ................................................................... 75
7.3.4 Configuring Time Value of Response ....................................................................................... 75
7.3.5 Configuring the Time of Rejection ............................................................................................ 76
7.3.6 Configuring the Redial Times ................................................................................................... 76
7.3.7 Configuring the Size Of Window for Resending ...................................................................... 77
7.3.8 Configuring the Size of Accumulated Data Packet .................................................................. 77
7.3.9 Setting the Acknowledgement Time-Delay .............................................................................. 77
7.3.10 Setting the Maximum Numbers of Acknowledgement ........................................................... 78
7.3.11 Showing LLC2 Link Information ............................................................................................. 78
7.3.12 Debugging LLC2 Link Information ......................................................................................... 78
7.4 EXAMPLE OF LLC2 CONFIGURATION ..................................................................................................... 79