- Table of Contents
-
- 05-Network
- 01-VRF
- 02-Interface
- 03-Interface pairs
- 04-Interface collaboration
- 05-4G
- 06-Security zones
- 07-VLAN
- 08-MAC
- 09-DNS
- 10-ARP
- 11-ND
- 12-GRE
- 13-IPsec
- 14-ADVPN
- 15-L2TP
- 16-SSL VPN
- 17-Routing table
- 18-Static routing
- 19-Policy-based routing
- 20-OSPF
- 21-BGP
- 22-RIP
- 23-IP multicast routing
- 24-PIM
- 25-IGMP
- 26-DHCP
- 27-HTTP
- 28-SSH
- 29-NTP
- 30-FTP
- 31-Telnet
- 32-IP authentication
- 33-IPv4 whitelist
- 34-IPv6 whitelist
- 35-MAC access advanced settings
- 36-MAC authentication
- 37-MAC access silent MAC info
- 38-MAC address whitelist
- 39-Wireless
- Related Documents
-
31-Telnet
Title | Size | Download |
---|---|---|
31-Telnet | 12.80 KB |
Introduction
The device can act as a Telnet server to allow Telnet login.
The device can use ACLs to prevent unauthorized Telnet access. If the used ACLs exist and have rules, only users permitted by the ACLs can Telnet to the device.
Restrictions and guidelines
To enable Telnet login, you must enable the Telnet server, configure login authentication and common attributes, and assign user roles.