ii
Modem Connection Establishment ·········································································································4-2
Modem Attribute Configuration ···············································································································4-4
Configuration Prerequisites ·············································································································4-5
Configuration Procedure··················································································································4-5
Configuration Example ····················································································································4-5
5 User Interface Configuration Examples ··································································································5-1
User Authentication Configuration Example ···························································································5-1
Network diagram ·····························································································································5-1
Configuration procedure ··················································································································5-1
Command Authorization Configuration Example····················································································5-2
Network diagram ·····························································································································5-2
Configuration procedure ··················································································································5-3
Command Accounting Configuration Example ·······················································································5-4
Network diagram ·····························································································································5-4
Configuration procedure ··················································································································5-4
6 Logging In Through NMS··························································································································6-1
Introduction ·············································································································································6-1
Connection Establishment Using NMS ···································································································6-1
7 Specifying Source for Telnet Packets ·····································································································7-1
Introduction ·············································································································································7-1
Specifying Source IP address/Interface for Telnet Packets····································································7-1
Displaying the source IP address/Interface Specified for Telnet Packets ··············································7-2
8 Controlling Login Users····························································································································8-1
Introduction ·············································································································································8-1
Controlling Telnet Users ·························································································································8-1
Prerequisites····································································································································8-1
Controlling Telnet Users by Source IP Addresses ··········································································8-1
Controlling Telnet Users by Source and Destination IP Addresses················································8-2
Controlling Telnet Users by Source MAC Addresses ·····································································8-3
Configuration Example ····················································································································8-3
Controlling Network Management Users by Source IP Addresses ························································8-4
Prerequisites····································································································································8-4
Controlling Network Management Users by Source IP Addresses·················································8-4
Configuration Example ····················································································································8-5
Summary of Contents for S7906E - Switch
Page 82: ...1 4 DeviceA interface tunnel 1 DeviceA Tunnel1 service loopback group 1...
Page 200: ...1 11 DeviceB display vlan dynamic No dynamic vlans exist...
Page 598: ...ii...
Page 1757: ...4 9...
Page 1770: ...6 4...
Page 2017: ...2 11 Figure 2 3 SFTP client interface...
Page 2238: ...1 16 DeviceA cfd linktrace service instance 1 mep 1001 target mep 4002...