HP 6125G/XG Руководство по установке - Страница 15
Просмотреть онлайн или скачать pdf Руководство по установке для Переключатель HP 6125G/XG. HP 6125G/XG 35 страниц. Hp 6125g/xg ethernet blade switch
Также для HP 6125G/XG: Руководство по конфигурации (43 страниц), Quickspecs (11 страниц)
Press Enter at the prompt. When the command line prompt appears, you can configure the switch. For
more information about the configuration, see
Logging in through the OA module
To log in to the blade switch through the HP BladeSystem Onboard Administrator (OA) module:
Use a serial cable to connect the terminal (for example, a PC) to the serial port of the OA module.
1.
Turn on the PC, run a terminal emulator program (for example, Windows XP HyperTerminal) on
2.
the PC, and set terminal parameters as follows:
Bits per second—9,600
Data bits—8
Parity—None
Stop bits—1
Press Enter and the login information appears.
3.
Enter the username and password.
4.
OA prompt information appears on the login interface.
Enter the connect interconnect <bay_number> command, where the bay number argument
5.
specifies the slot number of the blade switch.
Press Enter.
6.
When the command line prompt appears, you can configure the switch. For more information
about the configuration, see
Configuring the blade switch
By default, the switch does not authenticate console login users. To increase system security and enable
remote management:
•
Configure a login authentication method, for example, Telnet, SSH, or NMS.
Configure access services.
•
Configuring an authentication method
You can configure authentication on a user interface to control access to the switch.
Table 2
describes the Telnet login authentication methods available for a VTY user interface. For more
information about login authentication methods, see HP 6125 Blade Switch Series Fundamentals
Configuration Guide.
Table 2 Telnet login authentication methods
Authentication
method
None
Password
"Configuring the blade
Characteristics
Easy to configure, insecure
Easy to configure, secure, providing flat user
management
"Configuring the blade
switch."
Application scenarios
Lab environments and extremely secure
network environments
Environments that do not need granular
privilege management
11
switch."