EasyManua.ls Logo

H3C S3100 8C SI - Page 37

H3C S3100 8C SI
944 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Operation Manual – Login
H3C S3100 Series Ethernet Switches Table of Contents
ii
Chapter 4 Logging in Using a Modem......................................................................................... 4-1
4.1 Introduction ........................................................................................................................ 4-1
4.2 Configuration on the Switch Side....................................................................................... 4-1
4.2.1 Modem Configuration.............................................................................................. 4-1
4.2.2 Switch Configuration ............................................................................................... 4-2
4.3 Modem Connection Establishment.................................................................................... 4-2
Chapter 5 Logging in through the Web-based Network Management System....................... 5-1
5.1 Introduction ........................................................................................................................ 5-1
5.2 Establishing an HTTP Connection..................................................................................... 5-1
5.3 Configuring the Login Banner............................................................................................ 5-2
5.3.1 Configuration Procedure ......................................................................................... 5-2
5.3.2 Configuration Example............................................................................................ 5-3
5.4 Enabling/Disabling the WEB Server.................................................................................. 5-4
Chapter 6 Logging in through NMS............................................................................................. 6-1
6.1 Introduction ........................................................................................................................ 6-1
6.2 Connection Establishment Using NMS.............................................................................. 6-1
Chapter 7 User Control................................................................................................................. 7-1
7.1 Introduction ........................................................................................................................ 7-1
7.2 Controlling Telnet Users ....................................................................................................7-1
7.2.1 Prerequisites ........................................................................................................... 7-1
7.2.2 Controlling Telnet Users by Source IP Addresses.................................................. 7-2
7.2.3 Controlling Telnet Users by Source and Destination IP Addresses........................ 7-2
7.2.4 Controlling Telnet Users by Source MAC Addresses ............................................. 7-3
7.2.5 Configuration Example............................................................................................ 7-4
7.3 Controlling Network Management Users by Source IP Addresses................................... 7-4
7.3.1 Prerequisites ........................................................................................................... 7-5
7.3.2 Controlling Network Management Users by Source IP Addresses ........................ 7-5
7.3.3 Configuration Example............................................................................................ 7-6
7.4 Controlling Web Users by Source IP Address................................................................... 7-6
7.4.1 Prerequisites ........................................................................................................... 7-7
7.4.2 Controlling Web Users by Source IP Addresses ....................................................7-7
7.4.3 Disconnecting a Web User by Force ...................................................................... 7-7
7.4.4 Configuration Example............................................................................................ 7-7

Table of Contents

Related product manuals