Controlling Network Management Users by Source IP Addresses
37
Controlling
Network
Management
Users by Source
IP Addresses
You can manage a S4200G series Ethernet switch through network management
software. Network management users can access switches through SNMP.
You need to perform the following two operations to control network management
users by source IP addresses.
■
Defining an ACL
■
Applying the ACL to control users accessing the switch through SNMP
Prerequisites
The controlling policy against network management users is determined, including
the source IP addresses to be controlled and the controlling actions (permitting or
denying).
Controlling Network
Management Users
by Source IP
Addresses
Controlling network management users by source IP addresses is achieved by
applying basic ACLs, which are numbered from 2000 to 2999.
You can specify different ACLs while configuring the SNMP community name, the
SNMP group name and the SNMP user name.
Table 27
Control network management users by source IP addresses
Operation
Command
Description
Enter system view
system-view
Create a basic ACL or
enter basic ACL view
acl number
acl-number
[
match-order
{
config
|
auto
} ]
As for the
acl number
command,
the
config
keyword is specified by
default.
Define rules for the
ACL
rule
[
rule-id
] {
permit
|
deny
} [
source
{
sour-addr sour-wildcard
|
any
} ] [
time-range
time-name ]
[
fragment
]
Required
Quit to system view
quit
Apply the ACL while
configuring the SNMP
community name
snmp-agent community
{
read
|
write
}
community-name
[ [
mib-view
view-name
] | [
acl
acl-number ]
]*
Optional
Apply the ACL while
configuring the SNMP
group name
snmp-agent group
{
v1
|
v2c }
group-name
[
read-view
read-view ]
[
write-view
write-view
] [
notify-view
notify-view
] [
acl
acl-number ]
snmp-agent group
v3
group-name
[
authentication
|
privacy
] [
read-view
read-view ]
[
write-view
write-view
] [
notify-view
notify-view
] [
acl
acl-number ]
Optional
Apply the ACL while
configuring the SNMP
user name
snmp-agent usm-user
{
v1
|
v2c
}
user-name
group-name
[
acl
acl-number ]
snmp-agent usm-user
v3
user-name
group-name
[
authentication-mode
{
md5
|
sha
}
auth-password
] [
privacy-mode
des56
priv-password
]
[
acl
acl-number ]
Optional
Summary of Contents for 3CR17660-91
Page 10: ...8 CONTENTS ...
Page 14: ...4 ABOUT THIS GUIDE ...
Page 46: ...32 CHAPTER 5 LOGGING IN THROUGH WEB BASED NETWORK MANAGEMENT SYSTEM ...
Page 48: ...34 CHAPTER 6 LOGGING IN THROUGH NMS ...
Page 60: ...46 CHAPTER 9 VLAN CONFIGURATION ...
Page 64: ...50 CHAPTER 10 MANAGEMENT VLAN CONFIGURATION ...
Page 80: ...66 CHAPTER 13 GVRP CONFIGURATION ...
Page 98: ...84 CHAPTER 15 LINK AGGREGATION CONFIGURATION ...
Page 112: ...98 CHAPTER 18 MAC ADDRESS TABLE MANAGEMENT ...
Page 126: ...112 CHAPTER 19 LOGGING IN THROUGH TELNET ...
Page 162: ...148 CHAPTER 20 MSTP CONFIGURATION ...
Page 274: ...260 CHAPTER 29 IGMP SNOOPING CONFIGURATION ...
Page 276: ...262 CHAPTER 30 ROUTING PORT JOIN TO MULTICAST GROUP CONFIGURATION ...
Page 298: ...284 CHAPTER 33 SNMP CONFIGURATION ...
Page 304: ...290 CHAPTER 34 RMON CONFIGURATION ...
Page 338: ...324 CHAPTER 36 SSH TERMINAL SERVICES ...
Page 356: ...342 CHAPTER 38 FTP AND TFTP CONFIGURATION ...
Page 365: ...Information Center Configuration Example 351 S4200G terminal logging ...
Page 366: ...352 CHAPTER 39 INFORMATION CENTER ...
Page 378: ...364 CHAPTER 40 BOOTROM AND HOST SOFTWARE LOADING ...
Page 384: ...370 CHAPTER 41 Basic System Configuration and Debugging ...
Page 388: ...374 CHAPTER 43 NETWORK CONNECTIVITY TEST ...
Page 406: ...392 CHAPTER 45 CONFIGURATION OF NEWLY ADDED CLUSTER FUNCTIONS ...