
Operation Manual – Login
H3C S3610&S5510 Series Ethernet Switches
Chapter 8 Controlling Login Users
8-1
Chapter 8 Controlling Login Users
8.1 Introduction
A switch provides ways to control different types of login users, as listed in
Table 8-1
Ways to control different types of login users
Login mode
Control method
Implementation
Related section
By source IP
addresses
Through basic
ACLs
Section
Telnet Users by Source IP
Addresses
”.
By source and
destination IP
addresses
Through
advanced ACLs
Section
Telnet Users by Source
and Destination IP
Addresses
”.
Telnet
By source MAC
addresses
Through Layer 2
ACLs
Section
Telnet Users by Source
MAC Addresses
SNMP
By source IP
addresses
Through basic
ACLs
Section
Network Management
Users by Source IP
Addresses
”
By source IP
addresses
Through basic
ACLs
Section
Web Users by Source IP
Addresses
”
WEB
Disconnect Web
users by force
By executing
commands in
CLI
Section
8.2 Controlling Telnet Users
8.2.1 Prerequisites
The controlling policy against Telnet users is determined, including the source and
destination IP addresses to be controlled and the controlling actions (permitting or
denying).
8.2.2 Controlling Telnet Users by Source IP Addresses
Controlling Telnet users by source IP addresses is achieved by applying basic ACLs,
which are numbered from 2000 to 2999.