Configuring CLI login
By default, you can log in to the CLI through the console port. After you log in, you can configure other CLI login methods, including Telnet and SSH.
To prevent illegal access to the CLI and control user behavior, perform the following tasks as required:
Configure login authentication.
Assign user roles.
Configure command authorization and command accounting.
Use ACLs to filter unauthorized logins.
This chapter describes how to configure and use CLI login methods, including login authentication, user roles, and common user line settings. For more information about command authorization, command accounting, and unauthorized access filtering, see "Controlling user access to the device."