H3C S5600 SERIES Operation Manual page 36

Hide thumbs Also See for S5600 SERIES:
Table of Contents

Advertisement

Modem Connection Establishment ·········································································································4-2
5 Logging In Through the Web-based Network Management System····················································5-1
Introduction ·············································································································································5-1
Establishing an HTTP Connection ··········································································································5-1
Configuring the Login Banner ·················································································································5-2
Configuration Procedure··················································································································5-2
Configuration Example ····················································································································5-3
Enabling/Disabling the WEB Server ·······································································································5-3
6 Logging In Through NMS··························································································································6-1
Introduction ·············································································································································6-1
Connection Establishment Using NMS ···································································································6-1
7 Configuring Source IP Address for Telnet Service Packets ·································································7-1
Overview ·················································································································································7-1
Configuring Source IP Address for Telnet Service Packets ···································································7-1
Displaying Source IP Address Configuration··························································································7-2
8 User Control ···············································································································································8-3
Introduction ·············································································································································8-3
Controlling Telnet Users ·························································································································8-3
Prerequisites····································································································································8-3
Controlling Telnet Users by Source IP Addresses ··········································································8-4
Controlling Telnet Users by Source and Destination IP Addresses················································8-4
Controlling Telnet Users by Source MAC Addresses ·····································································8-5
Configuration Example ····················································································································8-5
Controlling Network Management Users by Source IP Addresses ························································8-6
Prerequisites····································································································································8-6
Controlling Network Management Users by Source IP Addresses·················································8-6
Configuration Example ····················································································································8-7
Controlling Web Users by Source IP Address ························································································8-8
Prerequisites····································································································································8-8
Controlling Web Users by Source IP Addresses·············································································8-8
Disconnecting a Web User by Force·······························································································8-8
Configuration Example ····················································································································8-9
ii

Advertisement

Table of Contents
loading

Table of Contents