beautypg.com

Chapter 8 user control, 1 introduction, 2 controlling telnet users – H3C Technologies H3C S3100 Series Switches User Manual

Page 82: 1 prerequisites, 2 controlling telnet users by source ip addresses, Chapter 8 user control -1, 1 introduction -1 8.2 controlling telnet users -1

background image

Operation Manual – Login

H3C S3100-52P Ethernet Switch

Chapter 8 User Control

8-1

Chapter 8 User Control

8.1 Introduction

A switch provides ways to control different types of login users, as listed in Table 8-1.

Table 8-1

Ways to control different types of login users

Login

mode

Control

method

Implementation

Related section

By source IP

address

Through basic

ACL

Section 8.2.2 “Controlling Telnet

Users by Source IP Addresses”.

By source and

destination IP

address

Through

advanced ACL

Section 8.2.3 “Controlling Telnet

Users by Source and Destination

IP Addresses”.

Telnet

By source

MAC address

Through Layer 2

ACL

Section 8.2.4 “Controlling Telnet

Users by Source MAC

Addresses”

SNMP

By source IP

addresses

Through basic

ACL

Section 8.3 Controlling Network

Management Users by Source IP

Addresses”.

By source IP

addresses

Through basic

ACL

Section 8.4 “Controlling Web

Users by Source IP Address”.

WEB

Disconnect

Web users by

force

By executing

commands in

CLI

Section 8.4.3 “Disconnecting a

Web User by Force”.

8.2 Controlling Telnet Users

8.2.1 Prerequisites

The controlling policy against Telnet users is determined, including the source and
destination IP addresses and source MAC addresses to be controlled and the
controlling actions (permitting or denying).

8.2.2 Controlling Telnet Users by Source IP Addresses

Controlling Telnet users by source IP addresses is achieved by applying basic ACLs,
which are numbered from 2000 to 2999.