7 user control, Introduction, Controlling telnet users – H3C Technologies H3C S3100 Series Switches User Manual

Page 68: Prerequisites, Controlling telnet users by source ip addresses, User control

Advertising
background image

7-1

7

User Control

Refer to the ACL part for information about ACL.

Introduction

A switch provides ways to control different types of login users, as listed in

Table 7-1

.

Table 7-1 Ways to control different types of login users

Login mode

Control method

Implementation

Related section

By source IP
address

Through basic ACL

Section ”

Controlling Telnet Users by Source

IP Addresses

”.

By source and
destination IP
address

Through advanced
ACL

Section “

Controlling Telnet Users by Source

and Destination IP Addresses

”.

Telnet

By source MAC
address

Through Layer 2 ACL

Section “

Controlling Telnet Users by Source

MAC Addresses

SNMP

By source IP
addresses

Through basic ACL

Section “

Controlling Network Management

Users by Source IP Addresses

”.

By source IP
addresses

Through basic ACL

Section “

Controlling Web Users by Source IP

Address”

WEB

Disconnect Web
users by force

By executing
commands in CLI

Section “

Disconnecting a Web User by

Force”

Controlling Telnet Users

Prerequisites

The controlling policy against Telnet users is determined, including the source IP addresses, destination

IP addresses and source MAC addresses to be controlled and the controlling actions (permitting or

denying).

Controlling Telnet Users by Source IP Addresses

Controlling Telnet users by source IP addresses is achieved by applying basic ACLs, which are

numbered from 2000 to 2999.

Advertising