
Operation Manual – Login
H3C S5500-EI Series Ethernet Switches
Table of Contents
ii
Chapter 4 Logging in Using Modem............................................................................................ 4-1
4.1 Introduction ........................................................................................................................ 4-1
4.2 Configuration on the Administrator Side ............................................................................ 4-1
4.3 Configuration on the Switch Side....................................................................................... 4-1
4.3.1 Modem Configuration.............................................................................................. 4-1
4.3.2 Switch Configuration ............................................................................................... 4-2
4.4 Modem Connection Establishment .................................................................................... 4-3
Chapter 5 Logging in Through Web-based Network Management System ............................ 5-1
5.1 Introduction ........................................................................................................................ 5-1
5.2 HTTP Connection Establishment....................................................................................... 5-1
5.3 Web Server Shutdown/Startup .......................................................................................... 5-2
5.4 Displaying Web Users ....................................................................................................... 5-3
Chapter 6 Logging in Through NMS............................................................................................ 6-1
6.1 Introduction ........................................................................................................................ 6-1
6.2 Connection Establishment Using NMS.............................................................................. 6-1
Chapter 7 Configuring Source IP Address for Telnet Service Packets ................................... 7-1
7.1 Overview ............................................................................................................................ 7-1
7.2 Configuring Source IP Address for Telnet Service Packets .............................................. 7-1
7.3 Displaying the source IP address/Interface Specified for Telnet Packets ......................... 7-2
Chapter 8 Controlling Login Users.............................................................................................. 8-1
8.1 Introduction ........................................................................................................................ 8-1
8.2 Controlling Telnet Users .................................................................................................... 8-1
8.2.1 Prerequisites ........................................................................................................... 8-1
8.2.2 Controlling Telnet Users by Source IP Addresses.................................................. 8-1
8.2.3 Controlling Telnet Users by Source and Destination IP Addresses........................ 8-2
8.2.4 Controlling Telnet Users by Source MAC Addresses ............................................. 8-3
8.2.5 Configuration Example............................................................................................ 8-4
8.3 Controlling Network Management Users by Source IP Addresses ................................... 8-4
8.3.1 Prerequisites ........................................................................................................... 8-5
8.3.2 Controlling Network Management Users by Source IP Addresses ........................ 8-5
8.3.3 Configuration Example............................................................................................ 8-6
8.4 Controlling Web Users by Source IP Address................................................................... 8-7
8.4.1 Prerequisites ........................................................................................................... 8-7
8.4.2 Controlling Web Users by Source IP Addresses .................................................... 8-7
8.4.3 Disconnecting a Web User by Force ...................................................................... 8-8
8.4.4 Configuration Example............................................................................................ 8-8