CLI
After logging in to the CLI of a switch through a console port, mini USB port, Telnet, or STelnet, you can run the commands provided by the switch to manage and configure the switch. Typically, a user interface is required for each access method. Before using the CLI, configure a user page for the corresponding login mode.
Web system
The internal web server of a switch provides a GUI, on which you can easily manage and maintain the switch after login. The web system provides only basic maintenance and management functions. You still need to use the CLI to implement fine-grained management.
For details about the web system, see Web System Login.
Login Method |
Advantage |
Disadvantage |
Applicable Scenario |
Description |
---|---|---|---|---|
A dedicated console cable is used for effective device control. |
You cannot remotely log in to a switch to maintain it. |
|
Console port login is the basis for other login methods. By default, you can log in to a switch through the console port and have the user level of 15 after login. |
|
Use a Mini USB cable to connect the USB port on the PC to the Mini USB port on the device for effective device control. |
You cannot remotely log in to a switch to maintain it. |
You need to configure a switch that is powered on for the first time but no console port is available on your PC. |
The device connection method for mini USB port login is different from that for console port login but the communication parameters during login and configurations after login are the same. |
|
|
Data is transmitted using TCP in plain text, posing potential security risks. |
You need to configure a switch remotely on a network that does not require high security. |
By default, you cannot log in to a switch directly using Telnet. Before using Telnet to log in, you must locally log in to the switch through the console port or mini USB port. |
|
The Secure Shell (SSH) protocol provides secure remote logins on insecure networks to ensure data integrity and reliability, and secure data transmission. NOTE:
SSH in this document refers to SSH 2.0 unless otherwise stated. |
The configuration is complex. |
You need to configure a switch remotely on a network that requires high security. STelnet, based on the SSH protocol, provides powerful authentication functions to ensure information security and protect devices against attacks, such as IP spoofing attacks. |
By default, you cannot log in to a switch directly using STelnet. Before using STelnet to log in, you must locally log in to the switch through the console port or mini USB port or remotely log in using Telnet. |