ii
Configuration on the Switch Side············································································································4-1
Modem Configuration······················································································································4-1
Switch Configuration························································································································4-2
Modem Connection Establishment ·········································································································4-2
5 Logging in through the Web-based Network Management System·····················································5-1
Introduction ·············································································································································5-1
Establishing an HTTP Connection··········································································································5-1
Configuring the Login Banner ·················································································································5-2
Configuration Procedure··················································································································5-2
Configuration Example ····················································································································5-3
Enabling/Disabling the WEB Server ·······································································································5-3
6 Logging in through NMS···························································································································6-1
Introduction ·············································································································································6-1
Connection Establishment Using NMS···································································································6-1
7 User Control···············································································································································7-1
Introduction ·············································································································································7-1
Controlling Telnet Users ·························································································································7-1
Prerequisites····································································································································7-1
Controlling Telnet Users by Source IP Addresses··········································································7-1
Controlling Telnet Users by Source and Destination IP Addresses················································7-2
Controlling Telnet Users by Source MAC Addresses ·····································································7-2
Configuration Example ····················································································································7-3
Controlling Network Management Users by Source IP Addresses ························································7-4
Prerequisites····································································································································7-4
Controlling Network Management Users by Source IP Addresses·················································7-4
Configuration Example ····················································································································7-4
Controlling Web Users by Source IP Address························································································7-5
Prerequisites····································································································································7-5
Controlling Web Users by Source IP Addresses·············································································7-5
Disconnecting a Web User by Force·······························································································7-6
Configuration Example ····················································································································7-6