7 User Control ···············································································································································7-1
Introduction ·············································································································································7-1
Controlling Telnet Users ·························································································································7-1
Prerequisites····································································································································7-1
Configuration Example ····················································································································7-3
Prerequisites····································································································································7-4
Controlling Network Management Users by Source IP Addresses·················································7-4
Configuration Example ····················································································································7-5
Prerequisites····································································································································7-6
Configuration Example ····················································································································7-6
ii