
Chapter 7
| Authentication Commands
Management IP Filter
– 253 –
Command Usage
◆
The management interfaces are open to all IP addresses by default. Once you
add an entry to a filter list, access to that interface is restricted to the specified
addresses.
◆
If anyone tries to access a management interface on the switch from an invalid
address, the switch will reject the connection, enter an event message in the
system log, and send a trap message to the trap manager.
◆
IP address can be configured for SNMP, web, and Telnet access respectively.
Each of these groups can include up to five different sets of addresses, either
individual addresses or address ranges.
◆
When entering addresses for the same group (i.e., SNMP, web, or Telnet), the
switch will not accept overlapping address ranges. When entering addresses
for different groups, the switch will accept overlapping address ranges.
◆
You cannot delete an individual address from a specified range. You must
delete the entire range, and re-enter the addresses.
◆
You can delete an address range just by specifying the start address, or by
specifying both the start address and end address.
Example
This example restricts management access to the indicated addresses.
Console(config)#management all-client 192.168.1.19
Console(config)#management all-client 192.168.1.25 192.168.1.30
Console#
show management
This command displays the client IP addresses that are allowed management
access to the switch through various protocols.
Syntax
show
management
{
all-client
|
http-client
|
snmp-client
|
telnet-client
}
all-client
- Displays IP addresses for all groups.
http-client
-
Displays IP addresses for the web group.
snmp-client
-
Displays IP addresses for the SNMP group.
telnet-client
- Displays IP addresses for the Telnet group.
Command Mode
Privileged Exec
Summary of Contents for AS5700-54X
Page 42: ...Contents 42...
Page 44: ...Figures 44...
Page 52: ...Tables 52...
Page 54: ...Section I Getting Started 54...
Page 80: ...Chapter 1 Initial Switch Configuration Setting the System Clock 80...
Page 210: ...Chapter 6 Remote Monitoring Commands 210...
Page 358: ...Chapter 9 Access Control Lists ACL Information 358...
Page 418: ...Chapter 12 Port Mirroring Commands RSPAN Mirroring Commands 418...
Page 436: ...Chapter 15 UniDirectional Link Detection Commands 436...
Page 442: ...Chapter 16 Address Table Commands 442...
Page 506: ...Chapter 18 VLAN Commands Configuring VXLAN Tunneling 506...
Page 526: ...Chapter 19 Class of Service Commands Priority Commands Layer 3 and 4 526...
Page 544: ...Chapter 20 Quality of Service Commands 544...
Page 652: ...Chapter 22 Multicast Filtering Commands MLD Proxy Routing 652...
Page 680: ...Chapter 23 LLDP Commands 680...
Page 722: ...Chapter 24 CFM Commands Delay Measure Operations 722...
Page 732: ...Chapter 25 Domain Name Service Commands 732...
Page 790: ...Chapter 27 IP Interface Commands ND Snooping 790...
Page 1072: ...Section III Appendices 1072...
Page 1102: ...List of CLI Commands 1102...
Page 1115: ......
Page 1116: ...AS5700 54X AS6700 32X E032016 ST R02 149100000198A...