75
User login control
This chapter includes these sections:
•
•
Configuring login control over telnet users
•
Configuring source IP-based login control over NMS users
•
Configuring source IP-based login control over web users
User login control overview
The device provides the following login control methods:
Login Through Login control methods
ACL used
Telnet
Configuring source IP-based login control over telnet users
Basic ACL
Configuring source and destination IP-based login control
over telnet users
Advanced ACL
Configuring source MAC-based login control over telnet
users
Ethernet frame header ACL
NMS
Configuring source IP-based login control over NMS users
Basic ACL
Web
Configuring source IP-based login control over web users
Basic ACL
FIPS compliance
The device supports the FIPS mode that complies with NIST FIPS 140-2 requirements. Support for features,
commands, and parameters might differ in FIPS mode and non-FIPS mode. For more information about
FIPS mode, see the
Security Configuration Guide
.
Unless otherwise noted, devices in the configuration examples are operating in non-FIPS mode.
Configuring login control over telnet users
NOTE:
This feature is not supported in FIPS mode.
Configuration preparation
Before configuration, determine the permitted or denied source IP addresses, source MAC addresses,
and destination IP addresses.