Acl Control Configuration; Telnet/Ssh User Acl Configuration - 3Com Switch 4500 26-Port Configuration Manual

Switch 4500 family 26-port, 50-port, pwr 26-port, pwr 50-port
Hide thumbs Also See for Switch 4500 26-Port:
Table of Contents

Advertisement

144
C
7: ACL C
HAPTER
ACL Control
Configuration
TELNET/SSH User ACL
Configuration
ONFIGURATION
Networking Diagram
Figure 39 QoS Configuration Example
Configuration Procedure
Define port mirroring, with monitoring port being Ethernet3/0/8.
[4500-Ethernet3/0/8]monitor-port
[4500-Ethernet3/0/1]mirroring-port both
The Switch provides three modes for users to access devices remotely:
TELNET access
Security shell (SSH) access
Simple network management protocol (SNMP) access
The Switch provides security control features and controls the three access modes,
consequently preventing illegal users from logging into and accessing switches.
Security control can be divided into the following two levels:
Level 1 – User connection control. Configured access control list (ACL) filters
login users so that only legal users can be connected to the switch.
Level 2: User password authentication. Before logging into the switch, the
users connected to the switch must pass the password authentication.
This chapter describes how to configure level 1 security control, that is how to
configure ACLs for login users. For the level 2 security configuration, refer to
Interface
Configuration".
Before login users perform password authentication, the ACLs configured for
TELNET or SSH users filter some malicious or illegal connection request,
consequently assuring device security.
Configuration Prerequisites
You have correctly configured to log into switches in the TELNET or SSH mode.
E3/0/1
E3/0/8
E3/0/2
Server
"User

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents