8-18 Controlling Login UsersWhen controlling login users, go to these sections for information you are interested in:z Introductionz Controlling Telnet Usersz Controlling Network Management Users by Source IP AddressesIntroductionMultiple ways are available for controlling different types of login users, as listed in Table 8-1.Table 8-1 Ways to control different types of login usersLogin mode Control method Implementation Related sectionBy source IPaddresses Through basic ACLsControlling TelnetUsers by Source IPAddressesBy source anddestination IPaddressesThrough advancedACLsControlling TelnetUsers by Source andDestination IPAddressesTelnetBy source MACaddresses Through Layer 2 ACLsControlling TelnetUsers by Source MACAddressesSNMP By source IPaddresses Through basic ACLsControlling NetworkManagement Users bySource IP AddressesControlling Telnet UsersPrerequisitesThe controlling policy against Telnet users is determined, including the source and destination IPaddresses to be controlled and the controlling actions (permitting or denying).Controlling Telnet Users by Source IP AddressesThis configuration needs to be implemented by basic ACL; a basic ACL ranges from 2000 to 2999. Forthe definition of ACL, refer to ACL Configuration in the Security Volume.Follow these steps to control Telnet users by source IP addresses:To do… Use the command… RemarksEnter system view system-view —