3com S7906E Installation Instruction
8-1
8
Controlling Login Users
When controlling login users, go to these sections for information you are interested in:
z
z
z
Introduction
Multiple ways are available for controlling different types of login users, as listed in
.
Table 8-1 Ways to control different types of login users
Login mode
Control method
Implementation
Related section
By source IP
addresses
addresses
Through basic ACLs
By source and
destination IP
addresses
destination IP
addresses
Through advanced ACLs
Telnet
By source MAC
addresses
addresses
Through Layer 2 ACLs
SNMP
By source IP
addresses
addresses
Through basic ACLs
Controlling Telnet Users
Prerequisites
The controlling policy against Telnet users is determined, including the source and destination IP
addresses to be controlled and the controlling actions (permitting or denying).
Controlling Telnet Users by Source IP Addresses
This configuration needs to be implemented by basic ACL; a basic ACL ranges from 2000 to 2999. For
the definition of ACL, refer to ACL Configuration in the Security Volume.
Follow these steps to control Telnet users by source IP addresses:
To do…
Use the command…
Remarks
Enter system view
system-view
—
Create a basic ACL or enter
basic ACL view
basic ACL view
acl [ ipv6 ] number acl-number
[ match-order { config |
auto } ]
[ match-order { config |
auto } ]
As for the acl number
command, the config keyword
is specified by default.
command, the config keyword
is specified by default.