H3C Technologies H3C S5120 Series Switches User Manual

Page 36

Advertising
background image

ii

Configuration Example····························································································································4-2

5 Logging In Through NMS··························································································································5-1

Introduction ·············································································································································5-1

Connection Establishment Using NMS ···································································································5-1

6 Specifying Source for Telnet Packets ·····································································································6-1

Introduction ·············································································································································6-1

Specifying Source IP address/Interface for Telnet Packets····································································6-1

Displaying the source IP address/Interface Specified for Telnet Packets ··············································6-2

7 Controlling Login Users····························································································································7-1

Introduction ·············································································································································7-1

Controlling Telnet Users ·························································································································7-1

Prerequisites····································································································································7-1

Controlling Telnet Users by Source IP Addresses ··········································································7-1

Controlling Telnet Users by Source and Destination IP Addresses················································7-2

Controlling Telnet Users by Source MAC Addresses ·····································································7-3

Configuration Example ····················································································································7-3

Controlling Network Management Users by Source IP Addresses ························································7-4

Prerequisites····································································································································7-4

Controlling Network Management Users by Source IP Addresses·················································7-4

Configuration Example ····················································································································7-5

Controlling Web Users by Source IP Addresses ····················································································7-6

Prerequisites····································································································································7-6

Controlling Web Users by Source IP Addresses·············································································7-6

Forcing Online Web Users Offline···································································································7-7

Configuration Example ····················································································································7-7

Advertising