
60
C
HAPTER
2: L
OGGING
INTO
AN
E
THERNET
S
WITCH
User Control
n
Refer to“Password Control Configuration Operations” on page 555 for
information about the ACL.
A switch provides ways to control different types of login users, as listed in
Table 29.
Controlling Telnet Users
Prerequisites
The controlling policy against Telnet users is determined, including the source IP
addresses, destination IP addresses and source MAC addresses to be controlled
and the controlling actions (permitting or denying).
Controlling Telnet Users by Source IP Addresses
Controlling Telnet users by source IP addresses is achieved by applying basic ACLs,
which are numbered from 2000 to 2999.
Table 29
Ways to control different types of login users
Login
mode
Control method
Implementation
Related section
Telnet
By source IP
address
Through basic ACL
“Controlling Telnet Users by Source IP
Addresses”.
By source and
destination IP
address
Through advanced
ACL
“Controlling Telnet Users by Source
and Destination IP Addresses”.
By source MAC
address
Through Layer 2
ACL
“Controlling Telnet Users by Source
MAC Addresses”
SNMP
By source IP
addresses
Through basic ACL
“Controlling Network Management
Users by Source IP Addresses”.
WEB
By source IP
addresses
Through basic ACL
“Controlling Web Users by Source IP
Address”.
Disconnect Web
users by force
By executing
commands in CLI
“Disconnecting a Web User by Force”.
Table 30
Control Telnet users by source IP addresses
Operation
Command
Description
Enter system view
system-view
-
Create a basic ACL or
enter basic ACL view
acl number
acl-number
[
match-order
{
config
|
auto
} ]
As for the
acl number
command,
the
config
keyword is specified by
default.
Define rules for the
ACL
rule
[
rule-id
] {
deny | permit
} [
rule-string
]
Required
Quit to system view
quit
-
Enter user interface
view
user-interface
[
type
]
first-number
[
last-number
]
-
Содержание 4210 PWR
Страница 10: ...Password Control Configuration 556 Displaying Password Control 563 Password Control Configuration Example 564...
Страница 22: ...20 CHAPTER 1 CLI CONFIGURATION...
Страница 74: ...72 CHAPTER 3 CONFIGURATION FILE MANAGEMENT...
Страница 84: ...82 CHAPTER 5 VLAN CONFIGURATION...
Страница 96: ...94 CHAPTER 8 IP PERFORMANCE CONFIGURATION...
Страница 108: ...106 CHAPTER 9 PORT BASIC CONFIGURATION...
Страница 122: ...120 CHAPTER 11 PORT ISOLATION CONFIGURATION...
Страница 140: ...138 CHAPTER 13 MAC ADDRESS TABLE MANAGEMENT...
Страница 234: ...232 CHAPTER 17 802 1X CONFIGURATION...
Страница 246: ...244 CHAPTER 20 AAA OVERVIEW...
Страница 270: ...268 CHAPTER 21 AAA CONFIGURATION...
Страница 292: ...290 CHAPTER 26 DHCP BOOTP CLIENT CONFIGURATION...
Страница 318: ...316 CHAPTER 29 MIRRORING CONFIGURATION...
Страница 340: ...338 CHAPTER 30 CLUSTER...
Страница 362: ...360 CHAPTER 33 SNMP CONFIGURATION...
Страница 368: ...366 CHAPTER 34 RMON CONFIGURATION...
Страница 450: ...448 CHAPTER 39 TFTP CONFIGURATION...
Страница 451: ......
Страница 452: ...450 CHAPTER 39 TFTP CONFIGURATION...
Страница 470: ...468 CHAPTER 40 INFORMATION CENTER...
Страница 496: ...494 CHAPTER 44 DEVICE MANAGEMENT...