Modem Configuration ······················································································································4-1
Switch Configuration························································································································4-2
5 Logging in through the Web-based Network Management System·····················································5-1
Introduction ·············································································································································5-1
Configuring the Login Banner ·················································································································5-2
Configuration Procedure··················································································································5-2
Configuration Example ····················································································································5-3
6 Logging in through NMS···························································································································6-1
Introduction ·············································································································································6-1
7 User Control ···············································································································································7-1
Introduction ·············································································································································7-1
Controlling Telnet Users ·························································································································7-1
Prerequisites····································································································································7-1
Configuration Example ····················································································································7-3
Prerequisites····································································································································7-4
Controlling Network Management Users by Source IP Addresses·················································7-4
Configuration Example ····················································································································7-4
Prerequisites····································································································································7-5
Configuration Example ····················································································································7-6
ii