ii 
Configuration procedure··················································································································4-3 
Command Accounting Configuration Example ·······················································································4-4 
Network diagram ·····························································································································4-4 
Configuration procedure··················································································································4-4 
5 Logging in Through Web-based Network Management System··························································5-1 
Introduction ·············································································································································5-1 
Web Server Configuration·······················································································································5-1 
Displaying Web Users·····························································································································5-2 
Configuration Example····························································································································5-2 
6 Logging In Through NMS··························································································································6-1 
Introduction ·············································································································································6-1 
Connection Establishment Using NMS···································································································6-1 
7 Specifying Source for Telnet Packets·····································································································7-1 
Introduction ·············································································································································7-1 
Specifying Source IP address/Interface for Telnet Packets····································································7-1 
Displaying the source IP address/Interface Specified for Telnet Packets ··············································7-2 
8 Controlling Login Users····························································································································8-1 
Introduction ·············································································································································8-1 
Controlling Telnet Users ·························································································································8-1 
Prerequisites····································································································································8-1 
Controlling Telnet Users by Source IP Addresses ··········································································8-1 
Controlling Telnet Users by Source and Destination IP Addresses················································8-2 
Controlling Telnet Users by Source MAC Addresses ·····································································8-3 
Configuration Example ····················································································································8-3 
Controlling Network Management Users by Source IP Addresses ························································8-4 
Prerequisites····································································································································8-4 
Controlling Network Management Users by Source IP Addresses·················································8-4 
Configuration Example ····················································································································8-5 
Controlling Web Users by Source IP Addresses ····················································································8-6 
Prerequisites····································································································································8-6 
Controlling Web Users by Source IP Addresses·············································································8-6 
Forcing Online Web Users Offline···································································································8-6 
Configuration Example ····················································································································8-6 
9 Basic System Configurations···················································································································9-1 
Configuration Display······························································································································9-1 
Basic Configurations ·······························································································································9-1 
Entering/Exiting System View ·········································································································9-2 
Configuring the Device Name ·········································································································9-2 
Configuring the System Clock ·········································································································9-2 
Enabling/Disabling the Display of Copyright Information ································································9-5 
Configuring a Banner·······················································································································9-6 
Configuring CLI Hotkeys··················································································································9-7 
Configuring Command Aliases········································································································9-8 
Configuring User Privilege Levels and Command Levels·······························································9-9 
Displaying and Maintaining Basic Configurations ·········································································9-14 
CLI Features ·········································································································································9-15