s7006 配置了web管理,修改过密码,但是登录显示认证失败,是什么原因,求助。
telnet server enable # lldp enable # ip http enable # switch-mode standard switch-mode normal slot 2 # switch-mode route-normal # password-recovery enable # vlan 1
(0)
web登录配置过程如下,你参考下看看哪里没配置:
V7版:
1,建立用户名密码
[H3C]local-user admin class manage
password si xxxx
service-type telnet http https
authorization-attribute user-role level-15
authorization-attribute user-role network-admin
quit
2,启用服务
[H3C]telnet server enable
[H3C]ip http enable
[H3C]ip https enable
3,建立接口地址:
[H3C]interface Vlan-interface 1
ip address 192.168.1.1 255.255.255.0
4,配置虚接口:
[H3C]line vty 0 63
authentication-mode scheme
quit
[H3C]quit
<H3C>save
这几部配置完成,就可以通过telnet、web方式登录了
V5版:
1,建立用户名密码
[H3C]local-user admin
password si xxxx
service-type telnet
service-type web
authorization-attribute level 3
2,启用服务
[H3C]telnet server enable
[H3C]ip http enable
3,建立接口地址:
[H3C]interface Vlan-interface 1
ip address 192.168.1.1 255.255.255.0
4,配置虚接口:
[H3C]user-interfac vty 0 4
authentication-mode scheme
quit
[H3C]quit
<H3C>save
(1)
来自一个初学者的敬意。感谢。
亲~登录后才可以操作哦!
确定你的邮箱还未认证,请认证邮箱或绑定手机后进行当前操作
举报
×
侵犯我的权益
×
侵犯了我企业的权益
×
抄袭了我的内容
×
原文链接或出处
诽谤我
×
对根叔社区有害的内容
×
不规范转载
×
举报说明
试过,也不行。
粘一下完整配置看下,排版 排版
<cw> #Jul 5 10:57:23:944 2019 cw SHELL/4/LOGIN: Trap 1.3.6.1.4.1.2011.10.2.2.1.1.3.0.1<h3cLogIn>: login from Console %Jul 5 10:57:23:964 2019 cw SHELL/5/SHELL_LOGIN: Console logged in from aux0. <cw>system System View: return to User View with Ctrl+Z. [cw]dis cu # version 5.20, Release 7710P01 # sysname cw # domain default enable system # telnet server enable # lldp enable # ip http enable # switch-mode standard switch-mode normal slot 2 # switch-mode route-normal # password-recovery enable # vlan 1 # vlan 10 # vlan 20 # vlan 30 # vlan 40 # vlan 50 # vlan 60 # vlan 70 # vlan 80 # vlan 90 # vlan 100 # vlan 200 # vlan 300 # vlan 400 # vlan 500 # domain system access-limit disable state active idle-cut disable self-service-url disable # dhcp server ip-pool vlan10 network 192.168.10.0 mask 255.255.255.0 gateway-list 192.168.10.254 dns-list 202.96.209.133 # dhcp server ip-pool vlan20 network 192.168.20.0 mask 255.255.255.0 gateway-list 192.168.20.254 dns-list 202.96.209.133 # dhcp server ip-pool vlan30 network 192.168.30.0 mask 255.255.255.0 gateway-list 192.168.30.254 dns-list 202.96.209.133 # dhcp server ip-pool vlan300 network 172.16.20.0 mask 255.255.255.0 gateway-list 172.16.20.254 dns-list 202.96.209.133 # dhcp server ip-pool vlan40 network 192.168.40.0 mask 255.255.255.0 gateway-list 192.168.40.254 dns-list 202.96.209.133 # dhcp server ip-pool vlan50 network 192.168.48.0 mask 255.255.252.0 gateway-list 192.168.53.254 dns-list 202.96.209.133 # dhcp server ip-pool vlan80 network 192.168.80.0 mask 255.255.252.0 gateway-list 192.168.80.254 dns-list 202.96.209.133 # dhcp server ip-pool vlan90 network 192.168.90.0 mask 255.255.255.0 gateway-list 192.168.90.254 dns-list 202.96.209.133 # user-group system group-attribute allow-guest # local-user admin password cipher $c$3$DseHebtZCOHeroTIVhZAevYxbRjwpR+paA== service-type ssh # stp enable # interface NULL0 # interface Vlan-interface1 ip address dhcp-alloc client-identifier mac Vlan-interface1 # interface Vlan-interface10 ip address 192.168.10.254 255.255.255.0 # interface Vlan-interface20 ip address 192.168.20.254 255.255.255.0 # interface Vlan-interface30 ip address 192.168.30.254 255.255.255.0 # interface Vlan-interface40 ip address 192.168.40.254 255.255.255.0 # interface Vlan-interface50 ip address 192.168.50.254 255.255.252.0 # interface Vlan-interface60 ip address 192.168.63.254 255.255.252.0 # interface Vlan-interface70 ip address 192.168.71.254 255.255.252.0 # interface Vlan-interface80 ip address 192.168.80.254 255.255.255.0 # interface Vlan-interface90 ip address 192.168.90.254 255.255.255.0 # interface Vlan-interface100 ip address 192.168.1.160 255.255.255.0 # interface Vlan-interface200 ip address 172.16.10.254 255.255.255.0 # interface Vlan-interface300 ip address 172.16.20.254 255.255.255.0 # interface Vlan-interface400 ip address 172.16.30.254 255.255.255.0 # interface Vlan-interface500 ip address 10.1.1.1 255.255.255.0 # interface GigabitEthernet2/0/1 port link-mode bridge shutdown # interface GigabitEthernet2/0/2 port link-mode bridge shutdown # interface GigabitEthernet2/0/3 port link-mode bridge # interface GigabitEthernet2/0/4 port link-mode bridge # interface GigabitEthernet2/0/5 port link-mode bridge port access vlan 200 # interface GigabitEthernet2/0/6 port link-mode bridge port link-type trunk port trunk permit vlan all # interface GigabitEthernet2/0/7 port link-mode bridge port link-type trunk port trunk permit vlan all shutdown # interface GigabitEthernet2/0/8 port link-mode bridge port link-type trunk port trunk permit vlan all shutdown # interface GigabitEthernet2/0/9 port link-mode bridge port link-type trunk port trunk permit vlan all # interface GigabitEthernet2/0/10 port link-mode bridge port link-type trunk port trunk permit vlan all # interface GigabitEthernet2/0/11 port link-mode bridge port link-type trunk port trunk permit vlan all # interface GigabitEthernet2/0/12 port link-mode bridge port link-type trunk port trunk permit vlan all # interface GigabitEthernet2/0/13 port link-mode bridge port link-type trunk port trunk permit vlan all # interface GigabitEthernet2/0/14 port link-mode bridge port link-type trunk port trunk permit vlan all # interface GigabitEthernet2/0/15 port link-mode bridge port link-type trunk port trunk permit vlan all # interface GigabitEthernet2/0/16 port link-mode bridge port link-type trunk port trunk permit vlan all # interface GigabitEthernet2/0/17 port link-mode bridge port link-type trunk port trunk permit vlan all # interface GigabitEthernet2/0/18 port link-mode bridge port link-type trunk port trunk permit vlan all # interface GigabitEthernet2/0/19 port link-mode bridge port link-type trunk port trunk permit vlan all # interface GigabitEthernet2/0/20 port link-mode bridge port link-type trunk port trunk permit vlan all speed 1000 duplex full # interface GigabitEthernet2/0/21 port link-mode bridge port link-type trunk port trunk permit vlan all # interface GigabitEthernet2/0/22 port link-mode bridge port access vlan 500 # interface GigabitEthernet2/0/23 port link-mode bridge port link-type trunk port trunk permit vlan all # interface GigabitEthernet2/0/24 port link-mode bridge port link-type trunk port trunk permit vlan all # interface GigabitEthernet2/0/25 port link-mode bridge port access vlan 100 # interface GigabitEthernet2/0/26 port link-mode bridge port link-type trunk port trunk permit vlan all # interface GigabitEthernet2/0/27 port link-mode bridge port link-type trunk port trunk permit vlan all # interface GigabitEthernet2/0/28 port link-mode bridge port link-type trunk port trunk permit vlan all # interface M-Ethernet0/0/0 # ip route-static 0.0.0.0 0.0.0.0 10.1.1.254 # undo info-center logfile enable # dhcp server forbidden-ip 17.16.20.1 172.16.20.10 dhcp server forbidden-ip 172.16.10.1 172.16.10.20 dhcp server forbidden-ip 192.168.1.1 192.168.1.50 dhcp server forbidden-ip 192.168.10.1 192.168.10.10 dhcp server forbidden-ip 192.168.20.1 192.168.20.10 dhcp server forbidden-ip 192.168.30.1 192.168.30.10 dhcp server forbidden-ip 192.168.40.1 192.168.40.10 dhcp server forbidden-ip 192.168.50.1 192.168.50.10 dhcp server forbidden-ip 192.168.60.1 192.168.60.10 dhcp server forbidden-ip 192.168.68.1 dhcp server forbidden-ip 192.168.71.253 dhcp server forbidden-ip 192.168.71.253 192.168.71.254 dhcp server forbidden-ip 192.168.80.1 192.168.80.10 dhcp server forbidden-ip 192.168.80.253 dhcp server forbidden-ip 192.168.80.253 192.168.80.254 dhcp server forbidden-ip 192.168.90.1 192.168.90.10 dhcp server forbidden-ip 192.168.90.253 dhcp server forbidden-ip 192.168.90.253 192.168.90.254 # dhcp enable # ssh user admin service-type stelnet authentication-type password # ip https enable # load xml-configuration # load tr069-configuration # user-interface aux 0 authentication-mode password set authentication password cipher $c$3$3xvh4Uq48WIklWqyrnO9Z5v4UQk6dJwmKDs= user-interface aux 1 user-interface vty 0 4 authentication-mode scheme protocol inbound ssh user-interface vty 5 13 authentication-mode scheme user-interface vty 14 15 # return
排版了,结果还是自动了。