- Table of Contents
-
- 06-Network
- 01-Scanner
- 02-VRF
- 03-Interface
- 04-Interface pairs
- 05-Interface collaboration
- 06-Security zones
- 07-VLAN
- 08-MAC
- 09-DNS
- 10-ARP
- 11-ND
- 12-Forwarding advanced settings
- 13-ALG
- 14-GRE
- 15-IPsec
- 16-ADVPN
- 17-L2TP
- 18-SSL VPN
- 19-Routing table
- 20-Static routing
- 21-Policy-based routing
- 22-OSPF
- 23-BGP
- 24-IS-IS
- 25-RIP
- 26-IPv4 multicast routing
- 27-IPv6 multicast routing
- 28-PIM
- 29-IGMP
- 30-MLD
- 31-DHCP
- 32-HTTP
- 33-SSH
- 34-NTP
- 35-FTP
- 36-Telnet
- 37-MAC authentication
- 38-MAC address whitelist
- 39-MAC access silent MAC info
- 40-MAC access advanced settings
- 41-IP authentication
- 42-IPv4 whitelist
- 43-IPv6 whitelist
- Related Documents
-
36-Telnet
Title | Size | Download |
---|---|---|
36-Telnet | 12.99 KB |
Telnet
Introduction
The device can act as a Telnet server to allow Telnet login.
The device can use ACLs to prevent unauthorized Telnet access. If the used ACLs exist and have rules, only users permitted by the ACLs can Telnet to the device.
Restrictions and guidelines
To enable Telnet login, you must enable the Telnet server, configure login authentication and common attributes, and assign user roles.