Qtech QSW-3900-48-Т-DC [22/245] Manage switch by telnet

Qtech QSW-3900-48-SFP-DC [22/245] Manage switch by telnet
QTECH Software Configuration Manual
1-21
Build successfully.
It means current configuration is saved successfully.
Following information is displayed when system booting :
Ready to load startup-config, press ENTER to run or CTRL+C to cancel :
Press enter button to make saved configuration be effective, and press CTRL+C to restore system default
configuration.
Step 6 : Administrator can use stop connection when overtime, while normal user can use this function in
user mode. Input timeout command to configure the overtime of users logging in to be 20 minutes. And use no
timeout command to configure overtime to be non-over timing.
Step 7 : Input following command after finishing operation to switch :
QTECH#quit
It is used to exit user interface.
1.5.2 Manage switch by telnet
Step 1 : Establish configuration environment by connecting computer by network to switch interface;
Step 2 : Run Telnet program in computer;
Step 3 : After switch is power on, input switch IP address to connect to switch, and input configured
logging in password according to the prompt, then the command line prompt is displayed (such as QTECH>). It will
be disconnected after 1 minute when there is not any input before successfully logging in or wrong inputting of user
name and password for 5 times. If there is such prompt as Sorry, session limit reached., please connect later (At
most 5 telnet users are allowed to log in at the same time.);
Step 4 : Use related command to configure switch system parameter or view switch operation. If you
want to enter privileged mode, user must possess the privilege of administrator. If you need any help, please input
?”at any moment. For concrete command, please refer to following chapters.
Step 5 : If you want to exit telnet, use quit or exit command to exit in user mode, and quit command to
exit in other mode. Administrator can use stop username command in privileged mode to exit logging in.
1.6 Brief introduction of SSH
SSH is short for Secure Shell. Users can access to the device via standard SSH client, and sent up safe
connection with device. The Data that transmitted via SSH connection are encrypt, which assure the transmitted
sensitive data, management data and configuration data, such as password, between the users and devices will not be
wiretapped or acquired illegally by the third party.
SSH can replace Telnet, providing users with means of safely management and device configuration.
1.7 SSH Configuration list
The configuration task list of SSH is as follows :
1) Enable/disable SSH function of the device
2) SSH secret key configuration
3) Others

Содержание

Похожие устройства

Скачать