![3Com CoreBuilder 3500 Command Reference Manual Download Page 78](http://html1.mh-extra.com/html/3com/corebuilder-3500/corebuilder-3500_command-reference-manual_4589654078.webp)
78
C
HAPTER
3: S
YSTEM
E
NVIRONMENT
system console
✓
3500
9000
✓
9400
✓
3900
✓
9300
security define
Gives a client trusted access to your system by adding the client IP address
and subnet mask to an access list.
Valid Minimum Abbreviation
sy co se de
Important Considerations
CAUTION:
Be careful when you define trusted IP clients. If you specify an
incorrect IP address or subnetwork address when you define a trusted IP
client, you can affect your own ability to access the system. See the
Implementation Guide
for your system.
■
Configure trusted IP clients in this order:
■
Define the trusted IP clients using
system console security
define
.
■
Display the list of configured trusted IP clients using
system
console security display
to verify that you have configured the
trusted IP clients correctly.
■
Enable the system to verify trusted IP clients using
system console
security access
.
■
You can configure up to five IP addresses or five subnetwork addresses
as trusted IP clients.
■
An IP address or subnetwork address can be used to access the system
only if it is on the trusted IP client list.
■
Use the subnet mask to allow trusted access to all addresses on a
particular subnetwork. Examples: The IP address 158.99.112.219
with a subnet mask of 255.255.255.0 allows trusted access to all
addresses on the 158.99.112 subnetwork. The IP address
158.99.112.219 with a subnet mask of 255.255.255.255 allows
access only by the single IP address 158.99.112.219.
■
The trusted IP client information is retained after a system reboot; that
is, it is saved in nvData.
Summary of Contents for CoreBuilder 3500
Page 18: ......
Page 26: ...26 ABOUT THIS GUIDE...
Page 27: ...I GETTING STARTED Chapter 1 Administration Overview Chapter 2 Command Summary...
Page 28: ......
Page 64: ...64 CHAPTER 2 COMMAND SUMMARY...
Page 65: ...II SYSTEM LEVEL FUNCTIONS Chapter 3 System Environment Chapter 4 Module Environment...
Page 66: ......
Page 148: ......
Page 202: ......
Page 248: ...248 CHAPTER 8 FIBER DISTRIBUTED DATA INTERFACE FDDI...
Page 250: ......
Page 320: ...320 CHAPTER 11 TRUNKS...
Page 368: ...368 CHAPTER 14 VIRTUAL LANS VLANS...
Page 394: ......
Page 502: ...502 CHAPTER 17 VIRTUAL ROUTER REDUNDANCY VRRP...
Page 604: ...604 CHAPTER 19 OPEN SHORTEST PATH FIRST OSPF...
Page 660: ...660 CHAPTER 20 IPX...
Page 687: ...VII TRAFFIC POLICY Chapter 22 Quality of Service QoS and RSVP...
Page 688: ......
Page 744: ...744 CHAPTER 22 QUALITY OF SERVICE QOS AND RSVP...
Page 745: ...VIII MONITORING Chapter 23 Event Log Chapter 24 Roving Analysis...
Page 746: ......
Page 754: ...754 CHAPTER 23 EVENT LOG...
Page 764: ...764 CHAPTER 24 ROVING ANALYSIS...
Page 765: ...IX REFERENCE Appendix A Technical Support...
Page 766: ......
Page 772: ...772 APPENDIX A TECHNICAL SUPPORT...
Page 784: ......