Operation Manual – Login
Quidway S3100 Series Ethernet Switches Table of Contents
Huawei Technologies Proprietary
ii
Chapter 4 Logging in Using Modem............................................................................................ 4-1
4.1 Introduction........................................................................................................................ 4-1
4.2 Configuration on the Administrator Side............................................................................ 4-1
4.3 Configuration on the Switch Side....................................................................................... 4-1
4.3.1 Modem Configuration.............................................................................................. 4-1
4.3.2 Switch Configuration ............................................................................................... 4-2
4.4 Modem Connection Establishment.................................................................................... 4-3
Chapter 5 Logging in through Web-based Network Management System ............................. 5-1
5.1 Introduction........................................................................................................................ 5-1
5.2 HTTP Connection Establishment....................................................................................... 5-1
Chapter 6 Logging in through NMS............................................................................................. 6-1
6.1 Introduction........................................................................................................................ 6-1
6.2 Connection Establishment Using NMS.............................................................................. 6-2
Chapter 7 Controlling Login Users.............................................................................................. 7-1
7.1 Introduction........................................................................................................................ 7-1
7.2 Controlling Telnet Users .................................................................................................... 7-1
7.2.1 Prerequisites ........................................................................................................... 7-1
7.2.2 Controlling Telnet Users by Source IP Addresses.................................................. 7-1
7.2.3 Controlling Telnet Users by Source and Destination IP Addresses........................ 7-2
7.2.4 Configuration Example............................................................................................ 7-3
7.3 Controlling Network Management Users by Source IP Addresses................................... 7-4
7.3.1 Prerequisites ........................................................................................................... 7-4
7.3.2 Controlling Network Management Users by Source IP Addresses ........................ 7-4
7.3.3 Configuration Example............................................................................................ 7-6
7.4 Controlling Web Users by Source IP Address................................................................... 7-6
7.4.1 Prerequisites ........................................................................................................... 7-7
7.4.2 Controlling Web Users by Source IP Addresses .................................................... 7-7
7.4.3 Disconnecting a Web User by Force ...................................................................... 7-7
7.4.4 Configuration Example............................................................................................ 7-7