Controlling Telnet Users; Controlling Login Users; Controlling Telnet Users By Source Ip Addresses - 3Com 4500G Family Configuration Manual

24/48 port
Hide thumbs Also See for 4500G Family:
Table of Contents

Advertisement

8

Controlling Login Users

When controlling login users, go to these sections for information you are interested in:
Introduction

Controlling Telnet Users

Controlling Network Management Users by Source IP Addresses
Introduction
Multiple ways are available for controlling different types of login users, as listed in
Table 8-1 Ways to control different types of login users
Login mode
Telnet
SNMP
Controlling Telnet Users
Prerequisites
The controlling policy against Telnet users is determined, including the source and destination IP
addresses to be controlled and the controlling actions (permitting or denying).

Controlling Telnet Users by Source IP Addresses

This configuration needs to be implemented by basic ACL; a basic ACL ranges from 2000 to 2999. For
the definition of ACL, refer to ACL Configuration in the Security Volume.
Follow these steps to control Telnet users by source IP addresses:
To do...
Enter system view
Create a basic ACL or enter
basic ACL view
Control method
By source IP addresses
By source and destination
IP addresses
By source MAC addresses
By source IP addresses
Use the command...
system-view
acl [ ipv6 ] number acl-number
[ match-order { config |
auto } ]
Implementation
Through basic
ACLs
Source IP Addresses
Through advanced
Source and Destination IP
ACLs
Addresses
Through Layer 2
Controlling Telnet Users by
ACLs
Source MAC Addresses
Through basic
Management Users by Source
ACLs
IP Addresses
As for the acl number
command, the config keyword
is specified by default.
8-1
Table
8-1.
Related section
Controlling Telnet Users by
Controlling Telnet Users by
Controlling Network
Remarks

Hide quick links:

Advertisement

Chapters

Table of Contents
loading

Table of Contents