Chapter 8 user control, 1 introduction, 2 controlling telnet users – H3C Technologies H3C S3100 Series Switches User Manual
Page 82: 1 prerequisites, 2 controlling telnet users by source ip addresses, Chapter 8 user control -1, 1 introduction -1 8.2 controlling telnet users -1

Operation Manual – Login
H3C S3100-52P Ethernet Switch
Chapter 8 User Control
8-1
Chapter 8 User Control
8.1 Introduction
A switch provides ways to control different types of login users, as listed in Table 8-1.
Table 8-1
Ways to control different types of login users
Login
mode
Control
method
Implementation
Related section
By source IP
address
Through basic
ACL
Section 8.2.2 “Controlling Telnet
Users by Source IP Addresses”.
By source and
destination IP
address
Through
advanced ACL
Section 8.2.3 “Controlling Telnet
Users by Source and Destination
Telnet
By source
MAC address
Through Layer 2
ACL
Section 8.2.4 “Controlling Telnet
SNMP
By source IP
addresses
Through basic
ACL
Section 8.3 “Controlling Network
By source IP
addresses
Through basic
ACL
Section 8.4 “Controlling Web
WEB
Disconnect
Web users by
force
By executing
commands in
CLI
Section 8.4.3 “Disconnecting a
8.2 Controlling Telnet Users
8.2.1 Prerequisites
The controlling policy against Telnet users is determined, including the source and
destination IP addresses and source MAC addresses to be controlled and the
controlling actions (permitting or denying).
8.2.2 Controlling Telnet Users by Source IP Addresses
Controlling Telnet users by source IP addresses is achieved by applying basic ACLs,
which are numbered from 2000 to 2999.