H3C Technologies H3C S3100 Series Switches User Manual

Page 30

Advertising
background image

ii

Configuration on the Switch Side············································································································4-1

Modem Configuration ······················································································································4-1

Switch Configuration························································································································4-2

Modem Connection Establishment ·········································································································4-2

5 Logging in through the Web-based Network Management System·····················································5-1

Introduction ·············································································································································5-1

Establishing an HTTP Connection ··········································································································5-1

Configuring the Login Banner ·················································································································5-2

Configuration Procedure··················································································································5-2

Configuration Example ····················································································································5-3

Enabling/Disabling the WEB Server ·······································································································5-3

6 Logging in through NMS···························································································································6-1

Introduction ·············································································································································6-1

Connection Establishment Using NMS ···································································································6-1

7 User Control ···············································································································································7-1

Introduction ·············································································································································7-1

Controlling Telnet Users ·························································································································7-1

Prerequisites····································································································································7-1

Controlling Telnet Users by Source IP Addresses ··········································································7-1

Controlling Telnet Users by Source and Destination IP Addresses················································7-2

Controlling Telnet Users by Source MAC Addresses ·····································································7-2

Configuration Example ····················································································································7-3

Controlling Network Management Users by Source IP Addresses ························································7-4

Prerequisites····································································································································7-4

Controlling Network Management Users by Source IP Addresses·················································7-4

Configuration Example ····················································································································7-4

Controlling Web Users by Source IP Address ························································································7-5

Prerequisites····································································································································7-5

Controlling Web Users by Source IP Addresses·············································································7-5

Disconnecting a Web User by Force·······························································································7-6

Configuration Example ····················································································································7-6

Advertising