authorized-manager ip-source

To configure an IP authorized manager, use the command authorized-manager ip-source in Global Configuration Mode. The no form of the command removes manager from authorized managers list.

authorized-manager ip-source

authorized-manager ip-source <ip_addr> { [<subnet-mask> } { | <prefix-length(1-32)>] } { | [interface } { {[fastethernet } { interface-type <0/a-b, 0/c, ...>] } { | [gigabitethernet } { interface-type <0/a-b, 0/c, ...>] } { | [extreme-ethernet } { <interface-type <a,b or a-b or a,b,c-d...>] } { | [vlan } { [vlan <a,b or a-b or a,b,c-d>] } { [cpu0] } { [service [snmp] | } { [service [snmp] | } { [telnet] } { | [http] } { | [https] } { | [ssh]] } { | port-channel } { <port_channel list (a,b or a-b or a,b,c-d)> }

no authorized-manager ip-source

no authorized-manager ip-source <ip_addr> { [<subnet-mask> } { | <prefix-length(1-32)>] }

Parameters

Parameter Type Description
ip_addr A.B.C.D Enter to set the network or host address from which the switch is managed. An address 0.0.0.0 indicates 'Any Manager'.
<subnet-mask>   Enter to set the subnet mask for the configured IP address. The configured subnet mask should be in the same subnet of the network in which the switch is placed
<prefix-length(1-32)> Integer Enter to configure the number of high-order bits in the IP address. These bits are common among all hosts within a network. This value ranges from 1 to 32.
interface   Configures the network or host address for the specified interface. The details to be provided are:
fastethernet   Enter for fastethernet. Officially referred to as 100BASE-T standard. This is a version of LAN standard architecture that supports data transfer up to 100 Megabits per second.
interface-type <0/a-b, 0/c, ...>   Enter to set the list of interfaces or a specific interface identifier. This value is a combination of slot number and port number separated by a slash. Use comma as a separator without space while configuring list of interfaces. Example: 0/1,0/3 or 1,3.
gigabitethernet   Enter for gigabitethernet.
interface-type <0/a-b, 0/c, ...>   Enter to set the list of interfaces or a specific interface identifier. This value is a combination of slot number and port number separated by a slash. Use comma as a separator without space while configuring list of interfaces. Example: 0/1,0/3 or 1,3.
extreme-ethernet   Enter for extreme-ethernet.
interface-type <a,b or a-b or a,b,c-d...>   Enter to set the list of interfaces or a specific interface identifier. This value is a combination of slot number and port number separated by a slash. Use comma as a separator without space while configuring list of interfaces. Example: 0/1,0/3 or 1,3.
vlan   Enter for vlan. It set the list of VLANs or a single specifc VLAN in which the IP authorized manager can reside
vlan <a,b or a-b or a,b,c-d>   Enter to determine the set of vlan interfaces.
cpu0   Enter to configure the access rights for the manager of the switch through OOB Port
service   Enter to configure the type of service to be used by the IP authorized manager. The values can be
snmp   Enter for snmp. It manages complex networks. SNMP works by sending messages, called PDUs, to different parts of a network. SNMP-compliant devices, called agents, store data about themselves in MIBs and return this data to the SNMP requesters
http   Enter for HTTP service. It defines how messages are formatted and transmitted, and what actions Web servers and browsers should take in response to various commands. For example, when you enter a URL in your browser, this actually sends an HTTP command to the Web server directing it to fetch and transmit the requested Web page
https   Enter for HTTPS service. It transmits data securely over the World Wide Web. S-HTTP is designed to transmit individual messages in a secured manner.
ssh   Enter for SSH service. It logs into another computer over a network, to execute commands in a remote machine, and to move files from one machine to another. It provides strong authentication and secure communications over insecure channels. It is a replacement for rlogin, rsh, rcp, and rdist. SSH protects a network from attacks such as IP spoofing, IP source routing, and DNS spoofing. An attacker who has managed to take over a network can only force ssh to disconnect. He or she cannot play back the traffic or hijack the connection when encryption is enabled
telnet   Enter for Telnet service.
port-channel   Enter for port-channel.
port_channel list (a,b or a-b or a,b,c-d)   Enter a combination for port_channel list. This value is a combination of numbers separated by a slash. Use comma as a separator without space while configuring list.

Mode

Global Configuration Mode

Default

All services are allowed for the configured manager

Examples

iS5comm(config)# authorized-manager ip-source 10.203.113.5 255.255.255.255 inter face gigabitethernet 0/1