ii5 Logging in Through Web-based Network Management System ··························································5-1Introduction ·············································································································································5-1Web Server Configuration·······················································································································5-1Displaying Web Users·····························································································································5-2Configuration Example····························································································································5-26 Logging In Through NMS··························································································································6-1Introduction ·············································································································································6-1Connection Establishment Using NMS ···································································································6-17 Specifying Source for Telnet Packets ·····································································································7-1Introduction ·············································································································································7-1Specifying Source IP address/Interface for Telnet Packets····································································7-1Displaying the source IP address/Interface Specified for Telnet Packets ··············································7-28 Controlling Login Users····························································································································8-1Introduction ·············································································································································8-1Controlling Telnet Users ·························································································································8-1Prerequisites····································································································································8-1Controlling Telnet Users by Source IP Addresses ··········································································8-1Controlling Telnet Users by Source and Destination IP Addresses················································8-2Controlling Telnet Users by Source MAC Addresses ·····································································8-3Configuration Example ····················································································································8-3Controlling Network Management Users by Source IP Addresses ························································8-4Prerequisites····································································································································8-4Controlling Network Management Users by Source IP Addresses·················································8-4Configuration Example ····················································································································8-5Controlling Web Users by Source IP Addresses ····················································································8-6Prerequisites····································································································································8-6Controlling Web Users by Source IP Addresses·············································································8-6Forcing Online Web Users Offline···································································································8-7Configuration Example ····················································································································8-7