H3C Technologies H3C WX6000 Series Access Controllers User Manual
Page 6

i
Table of Contents
1 Logging In Through an OAP Board ·········································································································1-1
OAP Board Overview······························································································································1-1
Logging In to the Operating System of an OAP Board ···········································································1-1
Resetting the System of an OAP Board··································································································1-2
2 Logging In Through Telnet ·······················································································································2-1
Introduction ·············································································································································2-1
Common Configuration····················································································································2-2
Telnet Configurations for Different Authentication Modes·······························································2-3
Configuration Procedure··················································································································2-3
Configuration Example ····················································································································2-5
Configuration Procedure··················································································································2-6
Configuration Example ····················································································································2-7
Configuration Procedure··················································································································2-8
Configuration Example ··················································································································2-12
Telnet Connection Establishment ·········································································································2-13
Telnetting to the Access controller Switch Interface Board from a Terminal ································2-13
Telnetting to Another Access controller from the Current One ·····················································2-15
Introduction ·············································································································································3-1
Establishing an HTTP Connection ··········································································································3-1
4 Logging In from an NMS ···························································································································4-1
Introduction ·············································································································································4-1
Connection Establishment ······················································································································4-1
Overview ·················································································································································5-1
Configuring Source IP Address for Telnet Service Packets ···································································5-1
Displaying the source IP address/Interface Specified for Telnet Packets ··············································5-2
6 Controlling Login Users····························································································································6-1
Introduction ·············································································································································6-1
Controlling Telnet Users ·························································································································6-1
Prerequisites····································································································································6-1
Controlling Telnet Users by Source IP Addresses ··········································································6-1
Controlling Telnet Users by Source and Destination IP Addresses················································6-2
Controlling Telnet Users by Source MAC Addresses ·····································································6-2
Configuration Example ····················································································································6-3