Operation Manual – LoginH3C S3100 Series Ethernet Switches Chapter 7 User Control7-1Chapter 7 User ControlNote:Refer to the ACL part for information about ACL.7.1 IntroductionA switch provides ways to control different types of login users, as listed in Table 7-1.Table 7-1 Ways to control different types of login usersLoginmodeControlmethod Implementation Related sectionBy source IPaddressThrough basicACLSection 7.2.2 “”Controlling TelnetUsers by Source IP Addresses.By source anddestination IPaddressThroughadvanced ACLSection 7.2.3 “Controlling TelnetUsers by Source and DestinationIP Addresses”.TelnetBy sourceMAC addressThrough Layer 2ACLSection 7.2.4 “Controlling TelnetUsers by Source MACAddresses”SNMP By source IPaddressesThrough basicACLSection 7.3 “Controlling NetworkManagement Users by Source IPAddresses”.By source IPaddressesThrough basicACLSection 7.4 Controlling WebUsers by Source IP AddressWEB DisconnectWeb users byforceBy executingcommands inCLISection 7.4.3 Disconnecting aWeb User by Force7.2 Controlling Telnet Users7.2.1 PrerequisitesThe controlling policy against Telnet users is determined, including the source IPaddresses, destination IP addresses and source MAC addresses to be controlled andthe controlling actions (permitting or denying).