Command Manual – QoS/ACL
Quidway S8500 Series Routing Switches
Chapter 3 ACL Control Commands to Control
Login Users
Huawei Technologies Proprietary
3-2
Note:
z
You can only apply number-based ACLs to implement the ACL control to users
accessing through Telnet or SSH.
z
When you use a basic or advanced ACL to implement the ACL control to the users
accessing through Telnet or SSH, incoming/outgoing connecting requests are
restricted based on the source or destination IP addresses. Therefore, when you
use the rules of a basic or advanced ACL, only the source IP address and its mask,
the destination IP address and its mask, and the
time-range
parameter in them are
valid. Similarly, when you use Layer 2 ACLs to implement the ACL control to the
users accessing through Telnet or SSH, incoming/outgoing requests are restricted
based on the source MAC addresses. Therefore, when you use the rules of a Layer
2 ACL, only the source MAC address and its mask and the
time-range
parameter
are valid.
z
When you use a Layer 2 ACL to implement ACL control to the users accessing
through Telnet or SSH, only incoming requests are restricted.
z
If a user fails to log in due to ACL restriction, the system logs the failure, including
the IP address, login method, user interface index value and the cause.
By default, the system does not restrict incoming/outgoing requests.
Example
# Perform ACL control to the users who access the local switch through Telnet
(assuming that ACL 2000 is previously created).
<Quidway> system-view
System View: return to User View with Ctrl+Z.
[Quidway] user-interface vty 0 4
[Quidway-user-interface-vty0-4] acl 2000 inbound
3.1.2 snmp-agent community
Syntax
snmp-agent community
{
read
|
write
}
community-name
[
mib-view
view-name
]
[
acl
acl-number
]
undo snmp-agent community
community-name
View
System view
Parameter