7 controlling login users, Introduction, Controlling telnet users – H3C Technologies H3C S5120 Series Switches User Manual
Page 73: Prerequisites, Controlling telnet users by source ip addresses, Controlling login users

7-1
7
Controlling Login Users
When controlling login users, go to these sections for information you are interested in:
z
z
z
Controlling Network Management Users by Source IP Addresses
Introduction
Multiple ways are available for controlling different types of login users, as listed in
.
Table 7-1 Ways to control different types of login users
Login mode
Control method
Implementation
Related section
By source IP
addresses
Through basic ACLs
By source and
destination IP
addresses
Through advanced
ACLs
Users by Source and
Destination IP
Addresses
Telnet
By source MAC
addresses
Through Layer 2 ACLs
Controlling Telnet
Users by Source MAC
Addresses
SNMP
By source IP
addresses
Through basic ACLs
Management Users by
Source IP Addresses
Controlling Telnet Users
Prerequisites
The controlling policy against Telnet users is determined, including the source and destination IP
addresses to be controlled and the controlling actions (permitting or denying).
Controlling Telnet Users by Source IP Addresses
This configuration needs to be implemented by basic ACL; a basic ACL ranges from 2000 to 2999. For
the definition of ACL, refer to ACL Configuration.
Follow these steps to control Telnet users by source IP addresses:
To do…
Use the command…
Remarks
Enter system view
system-view
—