9-3
To do…
Use the command…
Remarks
Apply a
basic or
advanced
ACL to
control
Telnet users
acl
acl-number
{
inbound
|
outbound
}
Apply an
ACL to
control
Telnet users
by ACL
Apply a
Layer 2 ACL
to control
Telnet users
acl
acl-number inbound
Required
Use either command
z
The
inbound
keyword specifies to
filter the users trying to Telnet to
the current switch.
z
The
outbound
keyword specifies
to filter users trying to Telnet to
other switches from the current
switch.
Configuration Example
Network requirements
Only the Telnet users sourced from the IP address of 10.110.100.52 are permitted to access the switch.
Network diagram
Figure 9-1
Network diagram for controlling Telnet users using ACLs
Switch
10.110.100.46
Host A
IP network
Host B
10.110.100.52
Configuration procedure
# Define a basic ACL.
<Sysname> system-view
[Sysname] acl number 2000
[Sysname-acl-basic-2000] rule 1 permit source 10.110.100.52 0
[Sysname-acl-basic-2000] quit
# Apply the ACL.
[Sysname] user-interface vty 0 4
[Sysname-ui-vty0-4] acl 2000 inbound
Controlling Network Management Users by Source IP Addresses
You can manage Switch 4200G through network management software. Network management users
can access switches through SNMP.
You need to perform the following two operations to control network management users by source IP
addresses.
Содержание Switch 4800G PWR 24-Port
Страница 165: ...1 8 4 mac address es found on port GigabitEthernet1 0 2 ...
Страница 214: ...ii Displaying and Maintaining System Guard 4 1 ...
Страница 445: ...ii ...
Страница 727: ...i Table of Contents Appendix A Acronyms A 1 ...
Страница 730: ...A 3 VOD Video On Demand W WRR Weighted Round Robin X XID eXchange Identification XRN eXpandable Resilient Networking ...