3-2Preree source IP addresses, destinationIP addresses and source MAC addresses to be controlled and the controlling actions (permitting ordenying).Controlling Telnet Users by Source IP AddressesC by s achieve ch arenumbered from 2000 to 2999.F ol T addresControlling Telnet UsersquisitesThe controlling policy against Telnet users is determined, including thontrolling Telnet users ource IP addresses is d by applying basic ACLs, whiollow these steps to contr elnet users by source IP ses:To do… Use the command… RemarksEnter system view system-view —Create a basic ACL orenter basic ACL viewacl number acl-number[ match-order { auto |config } ]As for the acl number command, theword is specified byconfig keydefault.Define rules for the ACL rule [ rule-id ] { deny |permit } [ rule-string ] RequiredQuit to system view quit —Enter user interface view user-interface [ type ]first-number [ last-number ] —Apply the ACL to controlyword specifies tofilter the users trying to Telnet to theThe outbound keyword specifies torrent switch.Telnet users by source IPaddressesacl acl-number { inbound |outbound } current switch.RequiredThe inbound kefilter users trying to Telnet to otherswitches from the cuControllin Source and Destination IP AddressesC y so eACLs, which are numbered from 3000 to 3999.Follo T tig Telnet Users byontrolling Telnet users b urce and destination IP address s is achieved by applying advancedw these steps to control elnet users by source and destina on IP addresses:To do… Use the command… RemarksEnter system view system-view —Create an advanced ACLview g } ]As for the acl number command,config keyword is specified bydefault.or enter advanced ACL acl number acl-number[ match-order { auto | confi theDefine rules for the ACL rule [ rule-id ] { deny | permit }protocol [ rule-string ]RequiredYou can define rules as needed tofilter by specific source anddestination IP addresses.Quit to system view quit —