H3C S7500E Series Ethernet Switches Operation Manual
Operation Manual – Login
H3C S7500E Series Ethernet Switches Chapter 7 Controlling Login Users
7-1
Chapter 7 Controlling Login Users
When controlling login users, go to these sections for information you are interested in:
z Introduction
z Controlling Telnet Users
z Controlling Network Management Users by Source IP Addresses
7.1 Introduction
Multiple ways are available for controlling different types of login users, as listed in
Table 7-1.
Table 7-1 Ways to control different types of login users
Login mode Control method Implementation Related section
By source IP
addresses
Through basic
ACLs
Controlling Telnet
Users by Source IP
Addresses
By source and
destination IP
addresses
Through advanced
ACLs
Controlling Telnet
Users by Source and
Destination IP
Addresses
Telnet
By source MAC
addresses
Through Layer 2
ACLs
Controlling Telnet
Users by Source
MAC Addresses
SNMP
By source IP
addresses
Through basic
ACLs
Controlling Network
Management Users
by Source IP
Addresses
7.2 Controlling Telnet Users
7.2.1 Prerequisites
The controlling policy against Telnet users is determined, including the source and
destination IP addresses to be controlled and the controlling actions (permitting or
denying).
7.2.2 Controlling Telnet Users by Source IP Addresses
Follow these steps to control Telnet users by source IP addresses: