3com S7906E Installation Instruction

Page of 2621
 
8-1 
8  
Controlling Login Users 
When controlling login users, go to these sections for information you are interested in: 
Introduction 
Multiple ways are available for controlling different types of login users, as listed in 
Table 8-1 Ways to control different types of login users 
Login mode 
Control method 
Implementation 
Related section 
By source IP 
addresses 
Through basic ACLs 
By source and 
destination IP 
addresses 
Through advanced ACLs 
Telnet 
By source MAC 
addresses 
Through Layer 2 ACLs 
SNMP 
By source IP 
addresses 
Through basic ACLs 
 
Controlling Telnet Users 
Prerequisites 
The controlling policy against Telnet users is determined, including the source and destination IP 
addresses to be controlled and the controlling actions (permitting or denying). 
Controlling Telnet Users by Source IP Addresses 
This configuration needs to be implemented by basic ACL; a basic ACL ranges from 2000 to 2999. For 
the definition of ACL, refer to ACL Configuration in the Security Volume
Follow these steps to control Telnet users by source IP addresses: 
To do… 
Use the command… 
Remarks 
Enter system view 
system-view 
— 
Create a basic ACL or enter 
basic ACL view 
acl ipv6 number acl-number 
[  match-order { config | 
auto } ] 
As for the acl number 
command, the config keyword 
is specified by default.