5-1
z The models listed in this document are not applicable to all regions. Please consult your local sales
office for the models applicable to your region.
z Support of the H3C WA series WLAN access points (APs) for features may vary by AP model. For
more information, see Feature Matrix.
z The interface types and the number of interfaces vary by AP model.
z The term AP in this document refers to common APs, wireless bridges, and mesh APs.
5 Controlling Login Users
This chapter includes these sections:
z Introduction
z Controlling Telnet Users
z Controlling Network Management Users by Source IP Addresses
z Controlling Web Users by Source IP Addresses
Introduction
Multiple ways are available for controlling different types of login users, as listed in Table 5-1.
Table 5-1 Ways to control different types of login users
Login mode Control method Implementation Related section
By SSIDs
Through WLAN
ACLs
Controlling Telnet Users by SSIDs
By source IP addresses Through basic ACLs
Controlling Telnet Users by Source
IP Addresses
By source and destination IP
addresses
Through advanced
ACLs
Controlling Telnet Users by
Source and Destination IP
Addresses
Telnet
By source MAC addresses
Through Layer 2
ACLs
Controlling Telnet Users by Source
MAC Addresses
SNMP By source IP addresses Through basic ACLs
Controlling Network Management
Users by Source IP Addresses
Controlling Telnet Users
Prerequisites
The source and destination IP addresses to be controlled and the controlling actions (permit or deny)
are determined.