
User Control
61
Controlling Telnet Users by Source and Destination IP Addresses
Controlling Telnet users by source and destination IP addresses is achieved by
applying advanced ACLs, which are numbered from 3000 to 3999.
Controlling Telnet Users by Source MAC Addresses
Controlling Telnet users by source MAC addresses is achieved by applying Layer 2
ACLs, which are numbered from 4000 to 4999.
Apply the ACL to
control Telnet users by
source IP addresses
acl
acl-number
{
inbound
|
outbound
}
Required
The
inbound
keyword specifies to
filter the users trying to Telnet to
the current switch.
The
outbound
keyword specifies
to filter users trying to Telnet to
other switches from the current
switch.
Table 31
Control Telnet users by source and destination IP addresses
Operation
Command
Description
Enter system view
system-view
-
Create an advanced
ACL or enter advanced
ACL view
acl number
acl-number
[
match-order
{
config
|
auto
} ]
As for the
acl number
command,
the
config
keyword is specified by
default.
Define rules for the
ACL
rule
[
rule-id
] {
deny
|
permit
}
protocol
[
rule-string
]
Required
You can define rules as needed to
filter by specific source and
destination IP addresses.
Quit to system view
quit
-
Enter user interface
view
user-interface
[
type
]
first-number
[
last-number
]
-
Apply the ACL to
control Telnet users by
specified source and
destination IP
addresses
acl
acl-number
{
inbound
|
outbound
}
Required
The
inbound
keyword specifies to
filter the users trying to Telnet to
the current switch.
The
outbound
keyword specifies
to filter users trying to Telnet to
other switches from the current
switch.
Table 32
Control Telnet users by source MAC addresses
Operation
Command
Description
Enter system view
system-view
-
Create or enter Layer 2
ACL view
acl number
acl-number
-
Define rules for the
ACL
rule
[
rule-id
] {
deny
|
permit
} [
rule-string
]
Required
You can define rules as needed to
filter by specific source MAC
addresses.
Quit to system view
quit
-
Table 30
Control Telnet users by source IP addresses
Operation Command
Description
Содержание 4210 PWR
Страница 10: ...Password Control Configuration 556 Displaying Password Control 563 Password Control Configuration Example 564...
Страница 22: ...20 CHAPTER 1 CLI CONFIGURATION...
Страница 74: ...72 CHAPTER 3 CONFIGURATION FILE MANAGEMENT...
Страница 84: ...82 CHAPTER 5 VLAN CONFIGURATION...
Страница 96: ...94 CHAPTER 8 IP PERFORMANCE CONFIGURATION...
Страница 108: ...106 CHAPTER 9 PORT BASIC CONFIGURATION...
Страница 122: ...120 CHAPTER 11 PORT ISOLATION CONFIGURATION...
Страница 140: ...138 CHAPTER 13 MAC ADDRESS TABLE MANAGEMENT...
Страница 234: ...232 CHAPTER 17 802 1X CONFIGURATION...
Страница 246: ...244 CHAPTER 20 AAA OVERVIEW...
Страница 270: ...268 CHAPTER 21 AAA CONFIGURATION...
Страница 292: ...290 CHAPTER 26 DHCP BOOTP CLIENT CONFIGURATION...
Страница 318: ...316 CHAPTER 29 MIRRORING CONFIGURATION...
Страница 340: ...338 CHAPTER 30 CLUSTER...
Страница 362: ...360 CHAPTER 33 SNMP CONFIGURATION...
Страница 368: ...366 CHAPTER 34 RMON CONFIGURATION...
Страница 450: ...448 CHAPTER 39 TFTP CONFIGURATION...
Страница 451: ......
Страница 452: ...450 CHAPTER 39 TFTP CONFIGURATION...
Страница 470: ...468 CHAPTER 40 INFORMATION CENTER...
Страница 496: ...494 CHAPTER 44 DEVICE MANAGEMENT...