beautypg.com

H3C Technologies H3C S3100 Series Switches User Manual

Page 31

background image

Operation Manual – Login

H3C S3100-52P Ethernet Switch

Table of Contents

ii

Chapter 4 Logging in Using Modem............................................................................................ 4-1

4.1 Introduction ........................................................................................................................ 4-1
4.2 Configuration on the Administrator Side............................................................................ 4-1
4.3 Configuration on the Switch Side....................................................................................... 4-1

4.3.1 Modem Configuration.............................................................................................. 4-1
4.3.2 Switch Configuration ............................................................................................... 4-2

4.4 Modem Connection Establishment.................................................................................... 4-3

Chapter 5 Logging in through Web-based Network Management System ............................. 5-1

5.1 Introduction ........................................................................................................................ 5-1
5.2 HTTP Connection Establishment....................................................................................... 5-1
5.3 Web Server Shutdown/Startup .......................................................................................... 5-2

Chapter 6 Logging in through NMS............................................................................................. 6-1

6.1 Introduction ........................................................................................................................ 6-1
6.2 Connection Establishment Using NMS.............................................................................. 6-1

Chapter 7 Configuring Source IP Address for Telnet Service Packets ................................... 7-1

7.1 Configuring Source IP Address for Telnet Service Packets .............................................. 7-1
7.2 Displaying Source IP Address Configuration..................................................................... 7-2

Chapter 8 User Control ................................................................................................................. 8-1

8.1 Introduction ........................................................................................................................ 8-1
8.2 Controlling Telnet Users .................................................................................................... 8-1

8.2.1 Prerequisites ........................................................................................................... 8-1
8.2.2 Controlling Telnet Users by Source IP Addresses.................................................. 8-1
8.2.3 Controlling Telnet Users by Source and Destination IP Addresses........................ 8-2
8.2.4 Controlling Telnet Users by Source MAC Addresses ............................................. 8-3
8.2.5 Configuration Example............................................................................................ 8-4

8.3 Controlling Network Management Users by Source IP Addresses ................................... 8-5

8.3.1 Prerequisites ........................................................................................................... 8-5
8.3.2 Controlling Network Management Users by Source IP Addresses ........................ 8-5
8.3.3 Configuration Example............................................................................................ 8-7

8.4 Controlling Web Users by Source IP Address................................................................... 8-7

8.4.1 Prerequisites ........................................................................................................... 8-8
8.4.2 Controlling Web Users by Source IP Addresses .................................................... 8-8
8.4.3 Disconnecting a Web User by Force ...................................................................... 8-8
8.4.4 Configuration Example............................................................................................ 8-9