
ii
Configuration procedure··················································································································4-3
Command Accounting Configuration Example ·······················································································4-4
Network diagram ·····························································································································4-4
Configuration procedure··················································································································4-4
5 Logging in Through Web-based Network Management System ··························································5-1
Introduction ·············································································································································5-1
Web Server Configuration·······················································································································5-1
Displaying Web Users·····························································································································5-2
Configuration Example····························································································································5-2
6 Logging In Through NMS··························································································································6-1
Introduction ·············································································································································6-1
Connection Establishment Using NMS···································································································6-1
7 Specifying Source for Telnet Packets ·····································································································7-1
Introduction ·············································································································································7-1
Specifying Source IP address/Interface for Telnet Packets····································································7-1
Displaying the source IP address/Interface Specified for Telnet Packets ··············································7-2
8 Controlling Login Users····························································································································8-1
Introduction ·············································································································································8-1
Controlling Telnet Users ·························································································································8-1
Prerequisites····································································································································8-1
Controlling Telnet Users by Source IP Addresses ··········································································8-1
Controlling Telnet Users by Source and Destination IP Addresses················································8-2
Controlling Telnet Users by Source MAC Addresses ·····································································8-3
Configuration Example ····················································································································8-3
Controlling Network Management Users by Source IP Addresses ························································8-4
Prerequisites····································································································································8-4
Controlling Network Management Users by Source IP Addresses·················································8-4
Configuration Example ····················································································································8-5
Controlling Web Users by Source IP Addresses ····················································································8-6
Prerequisites····································································································································8-6
Controlling Web Users by Source IP Addresses·············································································8-6
Forcing Online Web Users Offline···································································································8-6
Configuration Example ····················································································································8-6
9 Basic System Configurations···················································································································9-1
Configuration Display······························································································································9-1
Basic Configurations ·······························································································································9-1
Entering/Exiting System View ·········································································································9-2
Configuring the Device Name ·········································································································9-2
Configuring the System Clock ·········································································································9-2
Enabling/Disabling the Display of Copyright Information ································································9-5
Configuring a Banner·······················································································································9-6
Configuring CLI Hotkeys··················································································································9-7
Configuring Command Aliases········································································································9-8
Configuring User Privilege Levels and Command Levels·······························································9-9
Displaying and Maintaining Basic Configurations ·········································································9-14
CLI Features ·········································································································································9-15
Summary of Contents for 4210G Series
Page 459: ...4 8...
Page 493: ...12 1...
Page 968: ...19 6 000f e235 dc71 1 Config static GigabitEthernet 1 0 1 NOAGED 1 mac address es found...