H3C Technologies H3C WX6000 Series Access Controllers User Manual

Page 6

Advertising
background image

i

Table of Contents

1 Logging In Through an OAP Board ·········································································································1-1

OAP Board Overview······························································································································1-1
Logging In to the Operating System of an OAP Board ···········································································1-1
Resetting the System of an OAP Board··································································································1-2

2 Logging In Through Telnet ·······················································································································2-1

Introduction ·············································································································································2-1

Common Configuration····················································································································2-2
Telnet Configurations for Different Authentication Modes·······························································2-3

Telnet Configuration with Authentication Mode Being None ··································································2-3

Configuration Procedure··················································································································2-3
Configuration Example ····················································································································2-5

Telnet Configuration with Authentication Mode Being Password ···························································2-6

Configuration Procedure··················································································································2-6
Configuration Example ····················································································································2-7

Telnet Configuration with Authentication Mode Being Scheme······························································2-8

Configuration Procedure··················································································································2-8
Configuration Example ··················································································································2-12

Telnet Connection Establishment ·········································································································2-13

Telnetting to the Access controller Switch Interface Board from a Terminal ································2-13
Telnetting to Another Access controller from the Current One ·····················································2-15

3 Logging In Through the Web-Based Network Management System ···················································3-1

Introduction ·············································································································································3-1
Establishing an HTTP Connection ································································································
··········3-1

4 Logging In from an NMS ···························································································································4-1

Introduction ·············································································································································4-1
Connection Establishment ·······································································································
···············4-1

5 Configuring Source IP Address for Telnet Service Packets ·································································5-1

Overview ·················································································································································5-1
Configuring Source IP Address for Telnet Service Packets ···································································5-1
Displaying the source IP address/Interface Specified for Telnet Packets ··············································5-2

6 Controlling Login Users····························································································································6-1

Introduction ·············································································································································6-1
Controlling Telnet Users ·······································································································
··················6-1

Prerequisites····································································································································6-1
Controlling Telnet Users by Source IP Addresses ··········································································6-1
Controlling Telnet Users by Source and Destination IP Addresses················································6-2
Controlling Telnet Users by Source MAC Addresses ·····································································6-2
Configuration Example ····················································································································6-3

Controlling Network Management Users by Source IP Addresses ························································6-3

Advertising