beautypg.com

H3C Technologies H3C S3600 Series Switches User Manual

Page 39

background image

ii

Modem Connection Establishment ·········································································································4-2

5 Logging In Through the Web-based Network Management System····················································5-1

Introduction ·············································································································································5-1

Establishing an HTTP Connection ··········································································································5-1

Configuring the Login Banner ·················································································································5-2

Configuration Procedure··················································································································5-2

Configuration Example ····················································································································5-3

Enabling/Disabling the WEB Server ·······································································································5-3

6 Logging In Through NMS··························································································································6-1

Introduction ·············································································································································6-1

Connection Establishment Using NMS ···································································································6-1

7 Configuring Source IP Address for Telnet Service Packets ·································································7-1

Overview ·················································································································································7-1

Configuring Source IP Address for Telnet Service Packets ···································································7-1

Displaying Source IP Address Configuration ··························································································7-2

8 User Control ···············································································································································8-1

Introduction ·············································································································································8-1

Controlling Telnet Users ·························································································································8-2

Prerequisites····································································································································8-2

Controlling Telnet Users by Source IP Addresses ··········································································8-2

Controlling Telnet Users by Source and Destination IP Addresses················································8-2

Controlling Telnet Users by Source MAC Addresses ·····································································8-3

Configuration Example ····················································································································8-3

Controlling Network Management Users by Source IP Addresses ························································8-4

Prerequisites····································································································································8-4

Controlling Network Management Users by Source IP Addresses·················································8-4

Configuration Example ····················································································································8-5

Controlling Web Users by Source IP Address ························································································8-6

Prerequisites····································································································································8-6

Controlling Web Users by Source IP Addresses·············································································8-6

Disconnecting a Web User by Force·······························································································8-6

Configuration Example ····················································································································8-7

9 Switching User Level·································································································································9-1

Overview ·················································································································································9-1

Specifying the authentication mode for user level switching ··································································9-1

Adopting super password authentication for user level switching···················································9-2

Adopting HWTACACS authentication for user level switching························································9-3

Switching to a specific user level ············································································································9-4

Configuration examples ··························································································································9-4

Super password authentication configuration example···································································9-4

HWTACACS authentication configuration example ········································································9-5

This manual is related to the following products: