
Logging In Through the Web-based Network Management System.................................................... 2-31
Introduction.................................................................................................................................... 2-32
Establishing an HTTP Connection ................................................................................................ 2-32
Configuring the Login Banner........................................................................................................ 2-33
Enabling/Disabling the WEB Server.............................................................................................. 2-34
Logging In Through NMS ...................................................................................................................... 2-35
Introduction.................................................................................................................................... 2-35
Connection Establishment Using NMS ......................................................................................... 2-35
Configuring Source IP Address for Telnet Service Packets ................................................................. 2-35
Overview........................................................................................................................................ 2-36
Configuring Source IP Address for Telnet Service Packets.......................................................... 2-36
Displaying Source IP Address Configuration ................................................................................ 2-37
3
User Control ............................................................................................................................................... 3-1
Introduction ............................................................................................................................................. 3-1
Controlling Telnet Users ......................................................................................................................... 3-2
Prerequisites.................................................................................................................................... 3-2
Controlling Telnet Users by Source IP Addresses .......................................................................... 3-2
Controlling Telnet Users by Source and Destination IP Addresses................................................ 3-2
Controlling Telnet Users by Source MAC Addresses ..................................................................... 3-3
Configuration Example .................................................................................................................... 3-3
Controlling Network Management Users by Source IP Addresses ........................................................ 3-4
Prerequisites.................................................................................................................................... 3-4
Controlling Network Management Users by Source IP Addresses................................................. 3-4
Configuration Example .................................................................................................................... 3-5
Controlling Web Users by Source IP Address ........................................................................................ 3-6
Prerequisites.................................................................................................................................... 3-6
Controlling Web Users by Source IP Addresses............................................................................. 3-6
Disconnecting a Web User by Force............................................................................................... 3-6
Configuration Example .................................................................................................................... 3-7
4
Switching User Level................................................................................................................................. 4-1
Overview ................................................................................................................................................. 4-1
Specifying the authentication mode for user level switching .................................................................. 4-1
Adopting super password authentication for user level switching................................................... 4-2
Adopting HWTACACS authentication for user level switching........................................................ 4-3
Switching to a specific user level ............................................................................................................ 4-4
Configuration examples .......................................................................................................................... 4-4
Super password authentication configuration example................................................................... 4-4
HWTACACS authentication configuration example ........................................................................ 4-5
5
Configuration File Management ............................................................................................................... 5-1
Introduction to Configuration File ............................................................................................................ 5-1
Configuration Task List ........................................................................................................................... 5-2
Saving the Current Configuration .................................................................................................... 5-2
Erasing the Startup Configuration File ............................................................................................ 5-4
Specifying a Configuration File for Next Startup ............................................................................. 5-4
Displaying Switch Configuration...................................................................................................... 5-5
6
VLAN Overview .......................................................................................................................................... 6-1
VLAN Overview....................................................................................................................................... 6-1
ii