9-1
9
User Control
Go to these sections for information you are interested in:
z
Introduction
z
Controlling Telnet Users
z
Controlling Network Management Users by Source IP Addresses
z
Controlling Web Users by Source IP Address
Refer to the
ACL
part for information about ACL.
Introduction
You can control users logging in through Telnet, SNMP and WEB by defining Access Control List (ACL),
as listed in
Table 9-1
.
Table 9-1
Ways to control different types of login users
Login mode
Control method
Implementation
Related section
By source IP address
Through basic ACL
By source and
destination IP address
Through advanced
ACL
Telnet
By source MAC
address
Through Layer 2 ACL
Controlling Telnet Users
SNMP
By source IP
addresses
Through basic ACL
Controlling Network
Management Users by
Source IP Addresses
By source IP
addresses
Through basic ACL
Controlling Web Users by
Source IP Address
WEB
Disconnect Web
users by force
By executing
commands in CLI
Logging Out a Web User
Controlling Telnet Users
Introduction
The controlling policy against Telnet users’ access to VTY user interfaces is determined by referencing
ACL. For the introduction to ACL, refer to the
ACL
part of this manual.