9-1
9 User Control
Go to these sections for information you are interested in:
z Introduction
z Controlling Telnet Users
z Controlling Network Management Users by Source IP Addresses
z Controlling Web Users by Source IP Address
Refer to the ACL part for information about ACL.

Introduction

You can control users logging in through Telnet, SNMP and WEB by defining Access Control List (ACL),
as listed in Table 9-1.
Table 9-1 Ways to control different types of login users
Login mode Control method Implementation Related section
By source IP address Through basic ACL
By source and
destination IP address
Through advanced
ACL
Telnet
By source MAC
address Through Layer 2 ACL
Controlling Telnet Users
SNMP By source IP
addresses Through basic ACL
Controlling Network
Management Users by
Source IP Addresses
By source IP
addresses Through basic ACL Controlling Web Users by
Source IP Address
WEB
Disconnect Web
users by force
By executing
commands in CLI Logging Out a Web User

Controlling Telnet Users

Introduction
The controlling policy against Telnet users’ access to VTY user interfaces is determined by referencing
ACL. For the introduction to ACL, refer to the ACL part of this manual.