ii
5 Logging In Through NMS··························································································································5-1
Introduction ·············································································································································5-1
Connection Establishment Using NMS···································································································5-1
6 Specifying Source for Telnet Packets·····································································································6-1
Introduction ·············································································································································6-1
Specifying Source IP address/Interface for Telnet Packets····································································6-1
Displaying the source IP address/Interface Specified for Telnet Packets ··············································6-2
7 Controlling Login Users····························································································································7-1
Introduction ·············································································································································7-1
Controlling Telnet Users ·························································································································7-1
Prerequisites····································································································································7-1
Controlling Telnet Users by Source IP Addresses··········································································7-1
Controlling Telnet Users by Source and Destination IP Addresses················································7-2
Controlling Telnet Users by Source MAC Addresses ·····································································7-3
Configuration Example ····················································································································7-3
Controlling Network Management Users by Source IP Addresses ························································7-4
Prerequisites····································································································································7-4
Controlling Network Management Users by Source IP Addresses·················································7-4
Configuration Example ····················································································································7-5
Controlling Web Users by Source IP Addresses ····················································································7-6
Prerequisites····································································································································7-6
Controlling Web Users by Source IP Addresses·············································································7-6
Forcing Online Web Users Offline···································································································7-7
Configuration Example ····················································································································7-7