Source IP-based login control over web users configuration example

Network requirements

As shown in Figure 35, configure the device to allow only web users from Host B to access. Figure 35 Network diagram for configuring source IP-based login control

Configuration procedure

# Create ACL 2000, and configure rule 1 to permit packets sourced from Host B.

<Sysname> system-view

[Sysname] acl number 2030 match-order config [Sysname-acl-basic-2030] rule 1 permit source 10.110.100.52 0

#Associate the ACL with the HTTP service so that only web users from Host B are allowed to access the device.

[Sysname] ip http acl 2030

84