74
Step
Command
Remarks
3.
(Optional.) Enable
logging for SSH login
attempts that are
denied by the SSH
login control ACL.
ssh server acl-deny-log enable
By default, logging is disabled for
SSH login attempts that are
denied by the SSH login control
ACL.
For more information about this
command, see
Security Command
Reference
.
Configuration example
Network requirements
As shown in
, the device is a Telnet server.
Configure the device to permit only Telnet packets sourced from Host A and Host B.
Figure 16
Network diagram
Configuration procedure
# Configure an ACL to permit packets sourced from Host A and Host B.
<Sysname> system-view
[Sysname] acl basic 2000 match-order config
[Sysname-acl-ipv4-basic-2000] rule 1 permit source 10.110.100.52 0
[Sysname-acl-ipv4-basic-2000] rule 2 permit source 10.110.100.46 0
[Sysname-acl-ipv4-basic-2000] quit
# Apply the ACL to filter Telnet logins.
[Sysname] telnet server acl 2000
Controlling Web logins
Use a basic ACL (2000 to 2999) to filter HTTP and HTTPS traffic by source IP address. Only Web
users whose IP addresses are permitted by the ACL can access the device. If the ACL does not exist
or does not have any rules, no user login restriction is applied.
You can also log off suspicious Web users.
Host B
10.110.100.52
Device
IP network
Host A
10.110.100.46
Summary of Contents for FlexNetwork 10500 Series
Page 139: ...130 Sysname display version ...