9-1 
9
 
 
User Control 
Go to these sections for information you are interested in: 
z  Introduction 
z  Controlling Telnet Users 
z  Controlling Network Management Users by Source IP Addresses 
z  Controlling Web Users by Source IP Address 
 
 
Refer to the ACL part for information about ACL.  
 
Introduction 
You can control users logging in through Telnet, SNMP and WEB by defining Access Control List (ACL), 
as listed in 
Table 9-1. 
Table 9-1 Ways to control different types of login users 
Login mode  Control method  Implementation  Related section 
By source IP address Through basic ACL 
By source and 
destination IP address
Through advanced 
ACL 
Telnet 
By source MAC 
address 
Through Layer 2 ACL
Controlling Telnet Users 
SNMP 
By source IP 
addresses 
Through basic ACL 
Controlling Network 
Management Users by
 
Source IP Addresses
 
By source IP 
addresses 
Through basic ACL 
Controlling Web Users by 
Source IP Address
 
WEB  
Disconnect Web 
users by force 
By executing 
commands in CLI 
Logging Out a Web User 
 
Controlling Telnet Users 
Introduction 
The controlling policy against Telnet users’ access to VTY user interfaces is determined by referencing 
ACL. For the introduction to ACL, refer to the ACL part of this manual.