
i
Contents
Overview ······································································································································································ 1
F1000-A-EI/F1000-S-EI ···················································································································································· 1
Overview ··································································································································································· 1
Appearance ······························································································································································ 1
F1000-E ·············································································································································································· 2
Overview ··································································································································································· 2
Appearance ······························································································································································ 3
F5000 ················································································································································································ 3
Overview ··································································································································································· 3
Appearance ······························································································································································ 4
Firewall modules ······························································································································································· 5
Overview ··································································································································································· 5
Appearance ······························································································································································ 6
Enhanced firewall modules ·············································································································································· 6
UTM products ···································································································································································· 7
Overview ··································································································································································· 7
Appearance ······························································································································································ 8
Application scenarios ······················································································································································· 9
F1000-A-EI/F1000-S-EI ··········································································································································· 9
F1000-E ·································································································································································· 11
F5000 ····································································································································································· 12
Firewall modules ···················································································································································· 12
Enhanced firewall modules ·································································································································· 13
UTM ········································································································································································ 15
Login overview ··························································································································································· 17
Login methods at a glance ············································································································································ 17
CLI user interfaces ·························································································································································· 18
User interface assignment ····································································································································· 18
User interface identification ································································································································· 18
Logging in to the CLI ·················································································································································· 20
Logging in through the console port for the first time ································································································· 20
Configuring console login control settings ·················································································································· 22
Configuring none authentication for console login ··························································································· 23
Configuring password authentication for console login ··················································································· 24
Configuring scheme authentication for console login ······················································································· 24
Configuring common console user interface settings (optional) ······································································· 26
Logging in through Telnet ·············································································································································· 27
Configuring none authentication for Telnet login ······························································································ 29
Configuring password authentication for Telnet login ······················································································ 30
Configuring scheme authentication for Telnet login ·························································································· 31
Configuring common VTY user interface settings (optional) ············································································· 33
Using the device to log in to a Telnet server ······································································································ 34
Logging in through SSH ················································································································································ 35
Configuring the SSH server on the device ·········································································································· 36
Using the device to log in to an SSH server ······································································································· 38
Local login through the AUX port ································································································································· 38
Configuring none authentication for AUX login ································································································· 40
Configuring password authentication for AUX login ························································································· 41
Komentarze do niniejszej Instrukcji