5 Logging In Through the Web-based Network Management System····················································5-1
Introduction ·············································································································································5-1
Configuring the Login Banner ·················································································································5-2
Configuration Procedure··················································································································5-2
Configuration Example ····················································································································5-3
6 Logging In Through NMS··························································································································6-1
Introduction ·············································································································································6-1
Overview ·················································································································································7-1
Configuring Source IP Address for Telnet Service Packets ···································································7-1
8 User Control ···············································································································································8-3
Introduction ·············································································································································8-3
Controlling Telnet Users ·························································································································8-3
Prerequisites····································································································································8-3
Configuration Example ····················································································································8-5
Prerequisites····································································································································8-6
Controlling Network Management Users by Source IP Addresses·················································8-6
Configuration Example ····················································································································8-7
Prerequisites····································································································································8-8
Configuration Example ····················································································································8-9
ii