8-2
To do…
Use the command…
Remarks
Define rules for the ACL
rule
[
rule-id
] {
permit
|
deny
}
[
source
{
sour-addr
sour-wildcard
|
any
} |
time-range
time-name
|
fragment
|
logging
]*
Required
Quit to system view
quit
—
Enter user interface view
user-interface
[
type
]
first-number
[
last-number
]
—
Apply the ACL to control Telnet
users by source IP addresses
acl
[
ipv6
]
acl-number
{
inbound
|
outbound
}
Required
The
inbound
keyword
specifies to filter the users
trying to Telnet to the current
switch.
The
outbound
keyword
specifies to filter users trying to
Telnet to other switches from
the current switch.
Controlling Telnet Users by Source and Destination IP Addresses
This configuration needs to be implemented by advanced ACL; an advanced ACL ranges from 3000 to
3999. For the definition of ACL, refer to
ACL Configuration
in the
Security Volume
.
Follow these steps to control Telnet users by source and destination IP addresses:
To do…
Use the command…
Remarks
Enter system view
system-view
—
Create an advanced ACL or
enter advanced ACL view
acl
[
ipv6
]
number
acl-number
[
match-order
{
config
|
auto
} ]
As for the
acl number
command, the
config
keyword
is specified by default.
Define rules for the ACL
rule
[
rule-id
] {
permit
|
deny
}
rule-string
Required
You can define rules as needed
to filter by specific source and
destination IP addresses.
Quit to system view
quit
—
Enter user interface view
user-interface
[
type
]
first-number
[
last-number
]
—
Apply the ACL to control Telnet
users by specified source and
destination IP addresses
acl
[
ipv6
]
acl-number
{
inbound
|
outbound
}
Required
The
inbound
keyword
specifies to filter the users
trying to Telnet to the current
switch.
The
outbound
keyword
specifies to filter users trying to
Telnet to other switches from
the current switch.
Содержание S7902E
Страница 82: ...1 4 DeviceA interface tunnel 1 DeviceA Tunnel1 service loopback group 1 ...
Страница 200: ...1 11 DeviceB display vlan dynamic No dynamic vlans exist ...
Страница 494: ...ii Displaying and Maintaining Tunneling Configuration 1 45 Troubleshooting Tunneling Configuration 1 45 ...
Страница 598: ...ii ...
Страница 1757: ...4 9 ...
Страница 1770: ...6 4 ...
Страница 2017: ...2 11 Figure 2 3 SFTP client interface ...
Страница 2062: ...i Table of Contents 1 URPF Configuration 1 1 URPF Overview 1 1 What is URPF 1 1 How URPF Works 1 1 Configuring URPF 1 2 ...
Страница 2238: ...1 16 DeviceA cfd linktrace service instance 1 mep 1001 target mep 4002 ...
Страница 2442: ...2 4 Set the interval for sending Syslog or trap messages to 20 seconds Device mac address information interval 20 ...