ii
Switch Configuration························································································································4-2
Modem Connection Establishment ·········································································································4-2
5 CLI Configuration ······································································································································5-1
Introduction to the CLI·····························································································································5-1
Command Hierarchy ·······························································································································5-1
Command Level and User Privilege Level ······················································································5-1
Modifying the Command Level········································································································5-2
Switching User Level ·······················································································································5-3
CLI Views ················································································································································5-7
CLI Features ·········································································································································5-11
Online Help····································································································································5-11
Terminal Display····························································································································5-12
Command History··························································································································5-12
Error Prompts ································································································································5-13
Command Edit·······························································································································5-13
6 Logging In Through the Web-based Network Management Interface ·················································6-1
Introduction ·············································································································································6-1
Establishing an HTTP Connection ··········································································································6-1
Configuring the Login Banner ·················································································································6-2
Configuration Procedure··················································································································6-2
Configuration Example ····················································································································6-3
Enabling/Disabling the WEB Server ·······································································································6-3
7 Logging In Through NMS··························································································································7-1
Introduction ·············································································································································7-1
Connection Establishment Using NMS ···································································································7-1
8 User Control ···············································································································································8-1
Introduction ·············································································································································8-1
Controlling Telnet Users ·························································································································8-1
Introduction······································································································································8-1
Controlling Telnet Users by ACL ·····································································································8-2
Configuration Example ····················································································································8-3
Controlling Network Management Users by Source IP Addresses ························································8-3
Prerequisites····································································································································8-4
Controlling Network Management Users by Source IP Addresses·················································8-4
Configuration Example ····················································································································8-4
Controlling Web Users by Source IP Address ························································································8-5
Prerequisites····································································································································8-5
Controlling Web Users by Source IP Addresses·············································································8-5
Logging Out a Web User ·················································································································8-6
Configuration Example ····················································································································8-6