Operation Manual – Login
H3C S3100 Series Ethernet Switches
Chapter 7 User Control
7-1
Chapter 7 User Control
Note:
Refer to the
ACL
part for information about ACL.
7.1 Introduction
A switch provides ways to control different types of login users, as listed in
Table 7-1
.
Table 7-1
Ways to control different types of login users
Login
mode
Control
method
Implementation
Related section
By source IP
address
Through basic
ACL
Section
7.2.2
“”
Controlling Telnet
Users by Source IP Addresses
.
By source and
destination IP
address
Through
advanced ACL
Section
7.2.3
“
Controlling Telnet
Users by Source and Destination
IP Addresses
”.
Telnet
By source
MAC address
Through Layer 2
ACL
Section
7.2.4
“
Controlling Telnet
Users by Source MAC
Addresses
”
SNMP
By source IP
addresses
Through basic
ACL
Section
7.3
“
Controlling Network
Management Users by Source IP
Addresses
”.
By source IP
addresses
Through basic
ACL
Section
7.4 Controlling Web
Users by Source IP Address
WEB
Disconnect
Web users by
force
By executing
commands in
CLI
Section
7.4.3 Disconnecting a
Web User by Force
7.2 Controlling Telnet Users
7.2.1 Prerequisites
The controlling policy against Telnet users is determined, including the source IP
addresses, destination IP addresses and source MAC addresses to be controlled and
the controlling actions (permitting or denying).