144
C
7: ACL C
HAPTER
ACL Control
Configuration
TELNET/SSH User ACL
Configuration
ONFIGURATION
Networking Diagram
Figure 39 QoS Configuration Example
Configuration Procedure
Define port mirroring, with monitoring port being Ethernet3/0/8.
[4500-Ethernet3/0/8]monitor-port
[4500-Ethernet3/0/1]mirroring-port both
The Switch provides three modes for users to access devices remotely:
TELNET access
■
Security shell (SSH) access
■
Simple network management protocol (SNMP) access
■
The Switch provides security control features and controls the three access modes,
consequently preventing illegal users from logging into and accessing switches.
Security control can be divided into the following two levels:
Level 1 – User connection control. Configured access control list (ACL) filters
■
login users so that only legal users can be connected to the switch.
Level 2: User password authentication. Before logging into the switch, the
■
users connected to the switch must pass the password authentication.
This chapter describes how to configure level 1 security control, that is how to
configure ACLs for login users. For the level 2 security configuration, refer to
Interface
Configuration".
Before login users perform password authentication, the ACLs configured for
TELNET or SSH users filter some malicious or illegal connection request,
consequently assuring device security.
Configuration Prerequisites
You have correctly configured to log into switches in the TELNET or SSH mode.
E3/0/1
E3/0/8
E3/0/2
Server
"User