H3C S3100 Series Operation Manual page 30

H3c s3100 series ethernet switches operation manual
Hide thumbs Also See for S3100 Series:
Table of Contents

Advertisement

Configuration on the Switch Side············································································································4-1
Modem Configuration ······················································································································4-1
Switch Configuration························································································································4-2
Modem Connection Establishment ·········································································································4-2
5 Logging in through the Web-based Network Management System·····················································5-1
Introduction ·············································································································································5-1
Establishing an HTTP Connection ··········································································································5-1
Configuring the Login Banner ·················································································································5-2
Configuration Procedure··················································································································5-2
Configuration Example ····················································································································5-3
Enabling/Disabling the WEB Server ·······································································································5-3
6 Logging in through NMS···························································································································6-1
Introduction ·············································································································································6-1
Connection Establishment Using NMS ···································································································6-1
7 User Control ···············································································································································7-1
Introduction ·············································································································································7-1
Controlling Telnet Users ·························································································································7-1
Prerequisites····································································································································7-1
Controlling Telnet Users by Source IP Addresses ··········································································7-1
Controlling Telnet Users by Source and Destination IP Addresses················································7-2
Controlling Telnet Users by Source MAC Addresses ·····································································7-2
Configuration Example ····················································································································7-3
Controlling Network Management Users by Source IP Addresses ························································7-4
Prerequisites····································································································································7-4
Controlling Network Management Users by Source IP Addresses·················································7-4
Configuration Example ····················································································································7-4
Controlling Web Users by Source IP Address ························································································7-5
Prerequisites····································································································································7-5
Controlling Web Users by Source IP Addresses·············································································7-5
Disconnecting a Web User by Force·······························································································7-6
Configuration Example ····················································································································7-6
ii

Advertisement

Chapters

Table of Contents
loading

Table of Contents