Operation Manual – Login
H3C S7500E Series Ethernet Switches
Chapter 7 Controlling Login Users
When controlling login users, go to these sections for information you are interested in:
Introduction
Controlling Telnet Users
Controlling Network Management Users by Source IP Addresses
7.1 Introduction
Multiple ways are available for controlling different types of login users, as listed in
Table
7-1.
Table 7-1 Ways to control different types of login users
Login mode
Telnet
SNMP
7.2 Controlling Telnet Users
7.2.1 Prerequisites
The controlling policy against Telnet users is determined, including the source and
destination IP addresses to be controlled and the controlling actions (permitting or
denying).
7.2.2 Controlling Telnet Users by Source IP Addresses
Follow these steps to control Telnet users by source IP addresses:
Control method
By source IP
addresses
By source and
destination IP
addresses
By source MAC
addresses
By source IP
addresses
7-1
Chapter 7 Controlling Login Users
Implementation
Through basic
ACLs
Through advanced
ACLs
Through Layer 2
ACLs
Through basic
ACLs
Related section
Controlling
Telnet
Users by Source IP
Addresses
Controlling
Telnet
Users by Source and
Destination
IP
Addresses
Controlling
Telnet
Users
by
Source
MAC Addresses
Controlling Network
Management Users
by
Source
IP
Addresses