7-1
7
Controlling Login Users
When controlling login users, go to these sections for information you are interested in:
z
Introduction
z
Controlling Telnet Users
z
Controlling Network Management Users by Source IP Addresses
Introduction
Multiple ways are available for controlling different types of login users, as listed in
Table 7-1
.
Table 7-1
Ways to control different types of login users
Login mode
Control method
Implementation
Related section
By source IP addresses
Through basic
ACLs
Controlling Telnet Users by
Source IP Addresses
By source and destination
IP addresses
Through advanced
ACLs
Controlling Telnet Users by
Source and Destination IP
Addresses
Telnet
By source MAC addresses Through Layer 2
ACLs
Controlling Telnet Users by
Source MAC Addresses
SNMP
By source IP addresses
Through basic
ACLs
Controlling Network
Management Users by Source
IP Addresses
Controlling Telnet Users
Prerequisites
The controlling policy against Telnet users is determined, including the source and destination IP
addresses to be controlled and the controlling actions (permitting or denying).
Controlling Telnet Users by Source IP Addresses
This configuration needs to be implemented by basic ACL; a basic ACL ranges from 2000 to 2999. For
the definition of ACL, refer to
ACL Configuration
in the
Security Volume
.
Follow these steps to control Telnet users by source IP addresses:
To do…
Use the command…
Remarks
Enter system view
system-view
—
Create a basic ACL or enter
basic ACL view
acl
[
ipv6
]
number
acl-number
[
match-order
{
config
|
auto
} ]
As for the
acl number
command, the
config
keyword
is specified by default.
Содержание 4500G PWR 24-Port
Страница 200: ...1 5 ProviderB GigabitEthernet1 0 2 undo stp enable ProviderB GigabitEthernet1 0 2 bpdu tunnel dot1q stp ...
Страница 252: ...1 7 Clearing ARP entries from the ARP table may cause communication failures ...
Страница 362: ...i Table of Contents 1 Dual Stack Configuration 1 1 Dual Stack Overview 1 1 Configuring Dual Stack 1 1 ...
Страница 407: ...1 8 1 1 ms 1 ms 1 ms 1 1 6 1 2 1 ms 1 ms 1 ms 1 1 4 1 3 1 ms 1 ms 1 ms 1 1 2 2 Trace complete ...
Страница 786: ...1 16 3 In the case of PIM SM use the display current configuration command to check the BSR and RP information ...
Страница 1387: ...1 23 ...
Страница 1443: ...i Table of Contents 1 URPF Configuration 1 1 URPF Overview 1 1 What is URPF 1 1 How URPF Works 1 1 Configuring URPF 1 2 ...
Страница 1720: ...ii Single Device Upgrade 3 4 IRF System Upgrade 3 5 ...