ii
Configuration procedure..................................................................................................................4-3
Command Accounting Configuration Example.......................................................................................4-4
Network diagram .............................................................................................................................4-4
Configuration procedure..................................................................................................................4-4
5 Logging in Through Web-based Network Management System..........................................................5-1
Introduction .............................................................................................................................................5-1
Web Server Configuration.......................................................................................................................5-1
Displaying Web Users.............................................................................................................................5-2
Configuration Example............................................................................................................................5-2
6 Logging In Through NMS..........................................................................................................................6-1
Introduction .............................................................................................................................................6-1
Connection Establishment Using NMS...................................................................................................6-1
7 Specifying Source for Telnet Packets.....................................................................................................7-1
Introduction .............................................................................................................................................7-1
Specifying Source IP address/Interface for Telnet Packets....................................................................7-1
Displaying the source IP address/Interface Specified for Telnet Packets ..............................................7-2
8 Controlling Login Users............................................................................................................................8-1
Introduction .............................................................................................................................................8-1
Controlling Telnet Users .........................................................................................................................8-1
Prerequisites....................................................................................................................................8-1
Controlling Telnet Users by Source IP Addresses..........................................................................8-1
Controlling Telnet Users by Source and Destination IP Addresses................................................8-2
Controlling Telnet Users by Source MAC Addresses .....................................................................8-3
Configuration Example....................................................................................................................8-3
Controlling Network Management Users by Source IP Addresses ........................................................8-4
Prerequisites....................................................................................................................................8-4
Controlling Network Management Users by Source IP Addresses.................................................8-4
Configuration Example....................................................................................................................8-5
Controlling Web Users by Source IP Addresses ....................................................................................8-6
Prerequisites....................................................................................................................................8-6
Controlling Web Users by Source IP Addresses.............................................................................8-6
Forcing Online Web Users Offline...................................................................................................8-6
Configuration Example....................................................................................................................8-6
9 Basic System Configurations...................................................................................................................9-1
Configuration Display..............................................................................................................................9-1
Basic Configurations...............................................................................................................................9-1
Entering/Exiting System View .........................................................................................................9-2
Configuring the Device Name .........................................................................................................9-2
Configuring the System Clock.........................................................................................................9-2
Enabling/Disabling the Display of Copyright Information................................................................9-5
Configuring a Banner.......................................................................................................................9-6
Configuring CLI Hotkeys..................................................................................................................9-7
Configuring Command Aliases........................................................................................................9-8
Configuring User Privilege Levels and Command Levels...............................................................9-9
Displaying and Maintaining Basic Configurations .........................................................................9-14
CLI Features .........................................................................................................................................9-15