ii
Switch Configuration························································································································4-2
Modem Connection Establishment ·········································································································4-2
5 CLI Configuration ······································································································································5-1
Introduction to the CLI·····························································································································5-1
Command Hierarchy ·······························································································································5-1
Command Level and User Privilege Level ······················································································5-1
Modifying the Command Level········································································································5-2
Switching User Level·······················································································································5-3
CLI Views ················································································································································5-5
CLI Features ···········································································································································5-8
Online Help······································································································································5-8
Terminal Display······························································································································5-9
Command History··························································································································5-10
Error Prompts ································································································································5-10
Command Edit·······························································································································5-11
6 Logging In Through the Web-based Network Management Interface ·················································6-1
Introduction ·············································································································································6-1
Establishing an HTTP Connection··········································································································6-1
Configuring the Login Banner ·················································································································6-2
Configuration Procedure··················································································································6-2
Configuration Example ····················································································································6-3
Enabling/Disabling the WEB Server ·······································································································6-3
7 Logging In Through NMS··························································································································7-1
Introduction ·············································································································································7-1
Connection Establishment Using NMS···································································································7-1
8 Configuring Source IP Address for Telnet Service Packets ·································································8-1
Overview ·················································································································································8-1
Configuring Source IP Address for Telnet Service Packets ···································································8-1
Displaying Source IP Address Configuration··························································································8-2
9 User Control ···············································································································································9-1
Introduction ·············································································································································9-1
Controlling Telnet Users ·························································································································9-1
Introduction······································································································································9-1
Controlling Telnet Users by ACL ·····································································································9-2
Configuration Example ····················································································································9-3
Controlling Network Management Users by Source IP Addresses ························································9-3
Prerequisites····································································································································9-4
Controlling Network Management Users by Source IP Addresses·················································9-4
Configuration Example ····················································································································9-4
Controlling Web Users by Source IP Address ························································································9-5
Prerequisites····································································································································9-5
Controlling Web Users by Source IP Addresses·············································································9-5
Logging Out a Web User·················································································································9-6
Configuration Example ····················································································································9-6
Содержание Switch 4500 Family
Страница 89: ...1 6 round trip min avg max 2 3 5 ms...
Страница 257: ...ii Configuring IGMP Snooping 1 17 Configuring Multicast VLAN 1 18 Troubleshooting IGMP Snooping 1 21...
Страница 294: ...1 22 z If the multicast group set up by IGMP Snooping is not correct contact your technical support personnel...
Страница 361: ...3 27 Sysname isp system radius scheme cams...
Страница 726: ...1 18 0 00 packet loss round trip min avg max 50 60 70 ms...
Страница 739: ...i Table of Contents Appendix A Acronyms A 1...