Contents
Overview ······································································································································································ 1
Product overview·······························································································································································1
Firewall A-F1000-E···················································································································································1
Firewall A-F5000······················································································································································2
HP firewall modules ·················································································································································2
Application scenarios ·······················································································································································4
A-F1000-E application·············································································································································4
A-F5000 application················································································································································5
Firewall module application····································································································································6
Login methods ······························································································································································ 7
Login methods····································································································································································7
User interface overview ····················································································································································8
Users and user interfaces·········································································································································9
Numbering user interfaces ······································································································································9
CLI login······································································································································································10
Overview········································································································································································· 10
Introduction ···························································································································································· 10
Configuration requirements·································································································································· 10
Login procedure····················································································································································· 11
Logging in through Telnet·············································································································································· 21
Introduction ···························································································································································· 21
Logging in through SSH ················································································································································ 29
Introduction ···························································································································································· 29
Configuring the SSH server ·································································································································· 30
Logging in through the AUX port·································································································································· 33
Introduction ···························································································································································· 33
AUX login authentication modes ························································································································· 34
Configuration requirements·································································································································· 41
Login procedure····················································································································································· 41
Logging in through modems ········································································································································· 44
Introduction ···························································································································································· 44
i