iiConfiguring Source IP Address for Telnet Service Packets ···································································6-1Displaying Source IP Address Configuration··························································································6-27 User Control ···············································································································································7-1Introduction ·············································································································································7-1Controlling Telnet Users ·························································································································7-1Prerequisites····································································································································7-1Controlling Telnet Users by Source IP Addresses ··········································································7-1Controlling Telnet Users by Source and Destination IP Addresses················································7-2Controlling Telnet Users by Source MAC Addresses ·····································································7-3Configuration Example ····················································································································7-3Controlling Network Management Users by Source IP Addresses ························································7-4Prerequisites····································································································································7-4Controlling Network Management Users by Source IP Addresses·················································7-4Configuration Example ····················································································································7-5Controlling Web Users by Source IP Address ························································································7-5Prerequisites····································································································································7-6Controlling Web Users by Source IP Addresses·············································································7-6Disconnecting a Web User by Force·······························································································7-6Configuration Example ····················································································································7-6