< Home

Overview of CLI Login Methods

You can manage a switch through the command-line interface (CLI) or web system.
  • CLI

    After logging in to the CLI of a switch through a console port, mini USB port, Telnet, or STelnet, you can run the commands provided by the switch to manage and configure the switch. Typically, a user interface is required for each access method. Before using the CLI, configure a user page for the corresponding login mode.

  • Web system

    The internal web server of a switch provides a GUI, on which you can easily manage and maintain the switch after login. The web system provides only basic maintenance and management functions. You still need to use the CLI to implement fine-grained management.

    For details about the web system, see Web System Login.

Table 1 compares CLI login methods.
Table 1 Comparison between CLI login methods

Login Method

Advantage

Disadvantage

Applicable Scenario

Description

Login Through the Console Port

A dedicated console cable is used for effective device control.

You cannot remotely log in to a switch to maintain it.

  • You need to configure a switch that is powered on for the first time.
  • You cannot remotely log in to a switch.
  • A switch fails to start and you need to enter the BootROM menu to diagnose the fault or upgrade the switch.

Console port login is the basis for other login methods.

By default, you can log in to a switch through the console port and have the user level of 15 after login.

Login Through a Mini USB Port

Use a Mini USB cable to connect the USB port on the PC to the Mini USB port on the device for effective device control.

You cannot remotely log in to a switch to maintain it.

You need to configure a switch that is powered on for the first time but no console port is available on your PC.

The device connection method for mini USB port login is different from that for console port login but the communication parameters during login and configurations after login are the same.

Login Through Telnet

  • Facilitate remote management and maintenance of switches.
  • You do not need to connect each switch to a terminal, simplifying operations.

Data is transmitted using TCP in plain text, posing potential security risks.

You need to configure a switch remotely on a network that does not require high security.

By default, you cannot log in to a switch directly using Telnet. Before using Telnet to log in, you must locally log in to the switch through the console port or mini USB port.

Login Through STelnet

The Secure Shell (SSH) protocol provides secure remote logins on insecure networks to ensure data integrity and reliability, and secure data transmission.

NOTE:

SSH in this document refers to SSH 2.0 unless otherwise stated.

The configuration is complex.

You need to configure a switch remotely on a network that requires high security. STelnet, based on the SSH protocol, provides powerful authentication functions to ensure information security and protect devices against attacks, such as IP spoofing attacks.

By default, you cannot log in to a switch directly using STelnet. Before using STelnet to log in, you must locally log in to the switch through the console port or mini USB port or remotely log in using Telnet.

Copyright © Huawei Technologies Co., Ltd.
Copyright © Huawei Technologies Co., Ltd.
Next topic >