H3c-technologies H3C WX6000 Series Access Controllers Instrukcja Użytkownika Strona 6

  • Pobierz
  • Dodaj do moich podręczników
  • Drukuj
Przeglądanie stron 5
i
Table of Contents
1 Logging In Through an OAP Board ·········································································································1-1
OAP Board Overview······························································································································1-1
Logging In to the Operating System of an OAP Board···········································································1-1
Resetting the System of an OAP Board··································································································1-2
2 Logging In Through Telnet·······················································································································2-1
Introduction ·············································································································································2-1
Common Configuration····················································································································2-2
Telnet Configurations for Different Authentication Modes·······························································2-3
Telnet Configuration with Authentication Mode Being None ··································································2-3
Configuration Procedure··················································································································2-3
Configuration Example ····················································································································2-5
Telnet Configuration with Authentication Mode Being Password ···························································2-6
Configuration Procedure··················································································································2-6
Configuration Example ····················································································································2-7
Telnet Configuration with Authentication Mode Being Scheme······························································2-8
Configuration Procedure··················································································································2-8
Configuration Example ··················································································································2-12
Telnet Connection Establishment ·········································································································2-13
Telnetting to the Access controller Switch Interface Board from a Terminal ································2-13
Telnetting to Another Access controller from the Current One ·····················································2-15
3 Logging In Through the Web-Based Network Management System ···················································3-1
Introduction ·············································································································································3-1
Establishing an HTTP Connection ··········································································································3-1
4 Logging In from an NMS···························································································································4-1
Introduction ·············································································································································4-1
Connection Establishment ······················································································································4-1
5 Configuring Source IP Address for Telnet Service Packets·································································5-1
Overview ·················································································································································5-1
Configuring Source IP Address for Telnet Service Packets ···································································5-1
Displaying the source IP address/Interface Specified for Telnet Packets ··············································5-2
6 Controlling Login Users····························································································································6-1
Introduction ·············································································································································6-1
Controlling Telnet Users ·························································································································6-1
Prerequisites····································································································································6-1
Controlling Telnet Users by Source IP Addresses ··········································································6-1
Controlling Telnet Users by Source and Destination IP Addresses················································6-2
Controlling Telnet Users by Source MAC Addresses ·····································································6-2
Configuration Example ····················································································································6-3
Controlling Network Management Users by Source IP Addresses ························································6-3
Przeglądanie stron 5
1 2 3 4 5 6 7 8 9 10 11 ... 677 678

Komentarze do niniejszej Instrukcji

Brak uwag