1-15
Example for Upper-Layer Software Referencing ACLs
Example for Controlling Telnet Login Users by Source IP
Network requirements
Apply an ACL to permit users with the source IP address of 10.110.100.52 to telnet to the switch.
Network diagram
Figure 1-1
Network diagram for controlling Telnet login users by source IP
Switch
PC
10.110.100.52
Internet
Configuration procedure
# Define ACL 2000.
<Sysname> system-view
[Sysname] acl number 2000
[Sysname-acl-basic-2000] rule 1 permit source 10.110.100.52 0
[Sysname-acl-basic-2000] quit
# Reference ACL 2000 on VTY user interface to control Telnet login users.
[Sysname] user-interface vty 0 4
[Sysname-ui-vty0-4] acl 2000 inbound
Example for Controlling Web Login Users by Source IP
Network requirements
Apply an ACL to permit Web users with the source IP address of 10.110.100.46 to log in to the switch
through HTTP.
Network diagram
Figure 1-2
Network diagram for controlling Web login users by source IP
Switch
PC
10.110.100.46
Internet
Summary of Contents for S3100 Series
Page 74: ...7 7 Sysname ip http acl 2030...
Page 270: ...1 51 Sysname GigabitEthernet1 0 1 port trunk permit vlan all...
Page 579: ...ii Configuration Example 2 4 QoS Profile Configuration Example 2 4...
Page 713: ...1 22 Total associations 1...
Page 823: ...1 16...
Page 1054: ...i Table of Contents Appendix A Acronyms A 1...