1-12
Examples for Upper-layer Software Referencing ACLs

Example for Controlling Telnet Login Users by Source IP

Network requirements
As shown in Figure 1-1, apply an ACL to permit users with the source IP address of 10.110.100.52 to
telnet to the switching engine.
Figure 1-1 Network diagram for controlling Telnet login users by source IP
Switch PC
10.110.100.52
Internet
Configuration procedure
# Define ACL 2000.
<device> system-view
[device] acl number 2000
[device-acl-basic-2000] rule 1 permit source 10.110.100.52 0
[device-acl-basic-2000] quit
# Reference ACL 2000 on VTY user interface to control Telnet login users.
[device] user-interface vty 0 4
[device-ui-vty0-4] acl 2000 inbound

Example for Controlling Web Login Users by Source IP

Network requirements
As shown in Figure 1-2, apply an ACL to permit Web users with the source IP address of 10.110.100.46
to log in to the Switch through HTTP.
Figure 1-2 Network diagram for controlling Web login users by source IP
Switch PC
10.110.100.46

Intern et