ACL Control Configuration
377
Importing ACL
You can import a defined ACL in User Interface View to achieve ACL control.
Perform the following configurations respectively in System View and User Interface
View.
Table 400
Importing ACL
See the Command Reference Manual for details about these commands.
Configuration Example
Networking Requirement
Only the Telnet users from 10.110.100.52 and 10.110.100.46 can access the Switch.
Networking Diagram
Figure 98
ACL configuration for Telnet users
Configuration Procedure
1
Define a basic ACL.
[SW5500]
acl number 2000 match-order config
[SW5500-acl-basic-2000]
rule 1 permit source 10.110.100.52 0
[SW5500-acl-basic-2000]
rule 2 permit source 10.110.100.46 0
[SW5500-acl-basic-2000]
quit
2
Import the ACL.
[SW5500]
user-interface vty 0 4
[SW5500-ui-vty0-4]
acl 2000 inbound
Configuring ACL for
SNMP Users
The Switch 5500 Family supports remote network management (NM) and the user
can use SNMP to access them. Proper ACL configuration can prevent illegal users
from logging onto the Switches.
Two steps are included in this configuration:
1
Define an ACL
2
Import the ACL to control SNMP users
Defining ACL
Currently only number-based ACLs can be imported, with the number ranging from
2000 to 2999. See “Defining ACL” on page 353 for detailed configuration.
Operation
Command
Enter user interface view
(System View)
user-interface [
type
]
first_number
[
last_number
]
Import the ACL (User Interface
View)
acl
acl_number
{ inbound | outbound }
Internet
Switch
Содержание 5500 SI - Switch - Stackable
Страница 24: ...24 ABOUT THIS GUIDE...
Страница 30: ...30 CHAPTER 1 GETTING STARTED Figure 3 Setting up a New Connection Figure 4 Configuring the Port for Connection...
Страница 50: ...50 CHAPTER 1 GETTING STARTED...
Страница 54: ...54 CHAPTER 2 ADDRESS MANAGEMENT CONFIGURATION...
Страница 78: ...78 CHAPTER 3 PORT OPERATION...
Страница 88: ...88 CHAPTER 4 XRN CONFIGURATION...
Страница 122: ...122 CHAPTER 8 VLAN VPN CONFIGURATION...
Страница 216: ...216 CHAPTER 15 SSH TERMINAL SERVICES...
Страница 268: ...268 CHAPTER 16 IP ROUTING PROTOCOL OPERATION...
Страница 308: ...308 CHAPTER 17 NETWORK PROTOCOL OPERATION...
Страница 349: ...349...
Страница 350: ...350 CHAPTER 18 MULTICAST PROTOCOL...
Страница 522: ...522 CHAPTER 22 FILE SYSTEM MANAGEMENT...
Страница 584: ...584 CHAPTER 30 PASSWORD CONTROL CONFIGURATION OPERATIONS...
Страница 600: ...600 CHAPTER 31 MSDP CONFIGURATION...
Страница 614: ...614 CHAPTER 32 CLUSTERING...
Страница 670: ...670 CHAPTER C AUTHENTICATING THE SWITCH 5500 WITH CISCO SECURE ACS...