Operation Manual – LoginH3C S7500 Series Ethernet Switches Table of ContentsiiChapter 4 Logging in Using Modem............................................................................................ 4-14.1 Introduction ........................................................................................................................ 4-14.2 Configuration on the Administrator Side............................................................................ 4-14.3 Configuration on the Switch Side....................................................................................... 4-24.3.1 Modem Configuration.............................................................................................. 4-24.3.2 Switch Configuration ............................................................................................... 4-24.4 Modem Connection Establishment .................................................................................... 4-34.5 Modem Attributes Configuration ........................................................................................ 4-54.5.1 Configuration Prerequisites..................................................................................... 4-54.5.2 Configuration Procedure ......................................................................................... 4-54.5.3 Configuration Example............................................................................................ 4-6Chapter 5 Logging in through NMS............................................................................................. 5-15.1 Introduction ........................................................................................................................ 5-15.2 Connection Establishment Using NMS.............................................................................. 5-2Chapter 6 User Control ................................................................................................................. 6-16.1 Introduction ........................................................................................................................ 6-16.2 Controlling Telnet Users .................................................................................................... 6-16.2.1 Controlling Telnet Users by Source IP Addresses.................................................. 6-16.2.2 Controlling Telnet Users by Source and Destination IP Addresses........................ 6-26.3 Controlling Network Management Users by Source IP Addresses ................................... 6-36.3.1 Prerequisites ........................................................................................................... 6-36.3.2 Controlling Network Management Users by Source IP Addresses ........................ 6-46.3.3 Configuration Example............................................................................................ 6-5