8-38 User ControlGo to these sections for information you are interested in:z Introductionz Controlling Telnet Usersz Controlling Network Management Users by Source IP Addressesz Controlling Web Users by Source IP AddressRefer to the ACL part for information about ACL.IntroductionYou can control users logging in through Telnet, SNMP and WEB by defining Access Control List (ACL),as listed in Table 8-1.Table 8-1 Ways to control different types of login usersLogin mode Control method Implementation Related sectionBy source IP address Through basic ACL Controlling Telnet Users bySource IP AddressesBy source anddestination IP addressThrough advancedACLControlling Telnet Users bySource and Destination IPAddressesTelnetBy source MACaddress Through Layer 2 ACL Controlling Telnet Users bySource MAC AddressesSNMP By source IPaddresses Through basic ACLControlling NetworkManagement Users bySource IP AddressesBy source IPaddresses Through basic ACL Controlling Web Users bySource IP AddressWEBDisconnect Webusers by forceBy executingcommands in CLIDisconnecting a Web Userby ForceControlling Telnet UsersPrerequisitesThe controlling policy against Telnet users is determined, including the source IP addresses, destinationIP addresses and source MAC addresses to be controlled and the controlling actions (permitting ordenying).