390
C
HAPTER
20: C
ONFIGURATION
FOR
Q
O
S F
EATURES
Controlling Telnet using
Source MAC
This configuration can be implemented by means of Layer 2 ACL, which ranges from
4000 to 4999. For the definition of ACL, refer to ACL part.
Configuration Example
Network requirements
Only Telnet users from 10.110.100.52 and 10.110.100.46 can access the switch.
Network diagram
Figure 103
Perform ACL control over Telnet users of the switch
Configuration Procedure
1
Define the basic ACL.
[S5500] acl number 2000 match-order config
[S5500-acl-basic-2000] rule 1 permit source 10.110.100.52 0
[S5500-acl-basic-2000] rule 2 permit source 10.110.100.46 0
[S5500-acl-basic-2000] rule 3 deny source any
[S5500-acl-basic-2000] quit
2
Reference an ACL.
[S5500] user-interface vty 0 4
[S5500-ui-vty0-4] acl 2000 inbound
Table 411
Control Telnet using Source MAC
Configuration Procedure
Command
Description
Enter system view
system-view
—
Create or enter Layer 2 ACL
view
acl number
acl-number
—
Define the subset principle
rule
[
rule-id
]
{
permit
|
deny
} [
[
type
protocol-type type-mask |
lsap
lsap-type type-mask
]
|
format-type
|
cos
cos
|
source
{
source-vlan-id
|
source-mac-addr
source-mac-mask
}
* |
dest
{
dest-mac-addr
dest-mac-mask
}
|
time-range
name
]*
Required.
Users can configure the
filtering rules for the related
source MAC based on actual
requirements.
Exit ACL view
quit
—
Enter user interface view
user-interface
[
type
]
first-number
[
last-number
]
—
Reference an ACL, and
control Telnet using source
MAC
acl
acl-number
{
inbound
|
outbound
}
Required.
inbound
: Perform ACL control
over users Telnetting to the
local switch.
outbound
: Performs ACL
control over users Telnetting to
other switches from the local
switch.
Internet
Switch
Summary of Contents for 5500 SI - Switch - Stackable
Page 24: ...24 ABOUT THIS GUIDE...
Page 50: ...50 CHAPTER 1 GETTING STARTED...
Page 54: ...54 CHAPTER 2 ADDRESS MANAGEMENT CONFIGURATION...
Page 78: ...78 CHAPTER 3 PORT OPERATION...
Page 88: ...88 CHAPTER 4 XRN CONFIGURATION...
Page 122: ...122 CHAPTER 8 VLAN VPN CONFIGURATION...
Page 216: ...216 CHAPTER 15 SSH TERMINAL SERVICES...
Page 268: ...268 CHAPTER 16 IP ROUTING PROTOCOL OPERATION...
Page 308: ...308 CHAPTER 17 NETWORK PROTOCOL OPERATION...
Page 349: ...349...
Page 350: ...350 CHAPTER 18 MULTICAST PROTOCOL...
Page 522: ...522 CHAPTER 22 FILE SYSTEM MANAGEMENT...
Page 584: ...584 CHAPTER 30 PASSWORD CONTROL CONFIGURATION OPERATIONS...
Page 600: ...600 CHAPTER 31 MSDP CONFIGURATION...
Page 614: ...614 CHAPTER 32 CLUSTERING...
Page 670: ...670 CHAPTER C AUTHENTICATING THE SWITCH 5500 WITH CISCO SECURE ACS...