
ii
Configuration procedure ..................................................................................................................4-3
Command Accounting Configuration Example .......................................................................................4-4
Network diagram .............................................................................................................................4-4
Configuration procedure ..................................................................................................................4-4
5 Logging in Through Web-based Network Management System ..........................................................5-1
Introduction .............................................................................................................................................5-1
Web Server Configuration.......................................................................................................................5-1
Displaying Web Users.............................................................................................................................5-2
Configuration Example............................................................................................................................5-2
6 Logging In Through NMS..........................................................................................................................6-1
Introduction .............................................................................................................................................6-1
Connection Establishment Using NMS ...................................................................................................6-1
7 Specifying Source for Telnet Packets .....................................................................................................7-1
Introduction .............................................................................................................................................7-1
Specifying Source IP address/Interface for Telnet Packets....................................................................7-1
Displaying the source IP address/Interface Specified for Telnet Packets ..............................................7-2
8 Controlling Login Users............................................................................................................................8-1
Introduction .............................................................................................................................................8-1
Controlling Telnet Users .........................................................................................................................8-1
Prerequisites....................................................................................................................................8-1
Controlling Telnet Users by Source IP Addresses ..........................................................................8-1
Controlling Telnet Users by Source and Destination IP Addresses................................................8-2
Controlling Telnet Users by Source MAC Addresses .....................................................................8-3
Configuration Example ....................................................................................................................8-3
Controlling Network Management Users by Source IP Addresses ........................................................8-4
Prerequisites....................................................................................................................................8-4
Controlling Network Management Users by Source IP Addresses.................................................8-4
Configuration Example ....................................................................................................................8-5
Controlling Web Users by Source IP Addresses ....................................................................................8-6
Prerequisites....................................................................................................................................8-6
Controlling Web Users by Source IP Addresses.............................................................................8-6
Forcing Online Web Users Offline...................................................................................................8-6
Configuration Example ....................................................................................................................8-6
9 Basic System Configurations...................................................................................................................9-1
Configuration Display ..............................................................................................................................9-1
Basic Configurations ...............................................................................................................................9-1
Entering/Exiting System View .........................................................................................................9-2
Configuring the Device Name .........................................................................................................9-2
Configuring the System Clock .........................................................................................................9-2
Enabling/Disabling the Display of Copyright Information ................................................................9-5
Configuring a Banner.......................................................................................................................9-6
Configuring CLI Hotkeys..................................................................................................................9-7
Configuring Command Aliases........................................................................................................9-8
Configuring User Privilege Levels and Command Levels ...............................................................9-9
Displaying and Maintaining Basic Configurations .........................................................................9-14
CLI Features .........................................................................................................................................9-15
Содержание 4510G
Страница 502: ...4 8 ...
Страница 1010: ...18 6 000f e235 dc71 1 Config static GigabitEthernet 1 0 1 NOAGED 1 mac address es found ...