![3Com CoreBuilder 3500 Скачать руководство пользователя страница 78](http://html1.mh-extra.com/html/3com/corebuilder-3500/corebuilder-3500_command-reference-manual_4589654078.webp)
78
C
HAPTER
3: S
YSTEM
E
NVIRONMENT
system console
✓
3500
9000
✓
9400
✓
3900
✓
9300
security define
Gives a client trusted access to your system by adding the client IP address
and subnet mask to an access list.
Valid Minimum Abbreviation
sy co se de
Important Considerations
CAUTION:
Be careful when you define trusted IP clients. If you specify an
incorrect IP address or subnetwork address when you define a trusted IP
client, you can affect your own ability to access the system. See the
Implementation Guide
for your system.
■
Configure trusted IP clients in this order:
■
Define the trusted IP clients using
system console security
define
.
■
Display the list of configured trusted IP clients using
system
console security display
to verify that you have configured the
trusted IP clients correctly.
■
Enable the system to verify trusted IP clients using
system console
security access
.
■
You can configure up to five IP addresses or five subnetwork addresses
as trusted IP clients.
■
An IP address or subnetwork address can be used to access the system
only if it is on the trusted IP client list.
■
Use the subnet mask to allow trusted access to all addresses on a
particular subnetwork. Examples: The IP address 158.99.112.219
with a subnet mask of 255.255.255.0 allows trusted access to all
addresses on the 158.99.112 subnetwork. The IP address
158.99.112.219 with a subnet mask of 255.255.255.255 allows
access only by the single IP address 158.99.112.219.
■
The trusted IP client information is retained after a system reboot; that
is, it is saved in nvData.
Содержание CoreBuilder 3500
Страница 18: ......
Страница 26: ...26 ABOUT THIS GUIDE...
Страница 27: ...I GETTING STARTED Chapter 1 Administration Overview Chapter 2 Command Summary...
Страница 28: ......
Страница 64: ...64 CHAPTER 2 COMMAND SUMMARY...
Страница 65: ...II SYSTEM LEVEL FUNCTIONS Chapter 3 System Environment Chapter 4 Module Environment...
Страница 66: ......
Страница 147: ...III ESTABLISHING MANAGEMENT ACCESS Chapter 5 Out of Band Management Chapter 6 Simple Network Management Protocol SNMP...
Страница 148: ......
Страница 201: ...IV PHYSICAL PORT PARAMETERS Chapter 7 Ethernet Ports Chapter 8 Fiber Distributed Data Interface FDDI...
Страница 202: ......
Страница 248: ...248 CHAPTER 8 FIBER DISTRIBUTED DATA INTERFACE FDDI...
Страница 250: ......
Страница 320: ...320 CHAPTER 11 TRUNKS...
Страница 368: ...368 CHAPTER 14 VIRTUAL LANS VLANS...
Страница 394: ......
Страница 502: ...502 CHAPTER 17 VIRTUAL ROUTER REDUNDANCY VRRP...
Страница 604: ...604 CHAPTER 19 OPEN SHORTEST PATH FIRST OSPF...
Страница 660: ...660 CHAPTER 20 IPX...
Страница 687: ...VII TRAFFIC POLICY Chapter 22 Quality of Service QoS and RSVP...
Страница 688: ......
Страница 744: ...744 CHAPTER 22 QUALITY OF SERVICE QOS AND RSVP...
Страница 745: ...VIII MONITORING Chapter 23 Event Log Chapter 24 Roving Analysis...
Страница 746: ......
Страница 754: ...754 CHAPTER 23 EVENT LOG...
Страница 764: ...764 CHAPTER 24 ROVING ANALYSIS...
Страница 765: ...IX REFERENCE Appendix A Technical Support...
Страница 766: ......
Страница 772: ...772 APPENDIX A TECHNICAL SUPPORT...
Страница 784: ......