Introduction - H3C S5500-SI Series Operation Manual

Hide thumbs Also See for S5500-SI Series:
Table of Contents

Advertisement

Specifying Source IP address/Interface for Telnet Packets····································································6-1
Displaying the source IP address/Interface Specified for Telnet Packets ··············································6-2
7 Controlling Login Users····························································································································7-1
Introduction ·············································································································································7-1
Controlling Telnet Users ·························································································································7-1
Prerequisites····································································································································7-1
Controlling Telnet Users by Source IP Addresses ··········································································7-1
Controlling Telnet Users by Source and Destination IP Addresses················································7-2
Controlling Telnet Users by Source MAC Addresses ·····································································7-2
Configuration Example ····················································································································7-3
Controlling Network Management Users by Source IP Addresses ························································7-4
Prerequisites····································································································································7-4
Controlling Network Management Users by Source IP Addresses·················································7-4
Configuration Example ····················································································································7-5
Controlling Web Users by Source IP Addresses ····················································································7-6
Prerequisites····································································································································7-6
Controlling Web Users by Source IP Addresses·············································································7-6
Forcing Online Web Users Offline···································································································7-6
Configuration Example ····················································································································7-6
ii

Advertisement

Chapters

Table of Contents
loading

Table of Contents