7-1
7 User Control
Refer to the ACL part for information about ACL.
Introduction
A switch provides ways to control different types of login users, as listed in Table 7-1.
Table 7-1 Ways to control different types of login users
Login mode Control method Implementation Related section
By source IP
address
Through basic ACL
Section ”Controlling Telnet Users by Source
IP Addresses
”.
By source and
destination IP
address
Through advanced
ACL
Section “
Controlling Telnet Users by Source
and Destination IP Addresses
”.
Telnet
By source MAC
address
Through Layer 2 ACL
Section “Controlling Telnet Users by Source
MAC Addresses
”
SNMP
By source IP
addresses
Through basic ACL
Section “
Controlling Network Management
Users by Source IP Addresses
”.
By source IP
addresses
Through basic ACL
Section “Controlling Web Users by Source IP
Address”
WEB
Disconnect Web
users by force
By executing
commands in CLI
Section “
Disconnecting a Web User by
Force”
Controlling Telnet Users
Prerequisites
The controlling policy against Telnet users is determined, including the source IP addresses, destination
IP addresses and source MAC addresses to be controlled and the controlling actions (permitting or
denying).
Controlling Telnet Users by Source IP Addresses
Controlling Telnet users by source IP addresses is achieved by applying basic ACLs, which are
numbered from 2000 to 2999.