HP 6125G HP 6125G & 6125G/XG Blade Switches Fundamentals Configuration - Page 71

Controlling user logins, Configuring source IP-based Telnet login control

Page 71 highlights

Controlling user logins To harden device security, use ACLs to prevent unauthorized logins. For more information about ACLs, see ACL and QoS Configuration Guide. Controlling Telnet logins Use a basic ACL (2000 to 2999) to filter Telnet traffic by source IP address. Use an advanced ACL (3000 to 3999) to filter Telnet traffic by source and/or destination IP address. Use an Ethernet frame header ACL (4000 to 4999) to filter Telnet traffic by source MAC address. To access the device, a Telnet user must match a permit statement in the ACL applied to the user interface. Configuring source IP-based Telnet login control Step 1. Enter system view. 2. Create a basic ACL and enter its view, or enter the view of an existing basic ACL. Command system-view acl [ ipv6 ] number acl-number [ match-order { config | auto } ] Remarks N/A By default, no basic ACL exists. 3. Configure an ACL rule. rule [ rule-id ] { permit | deny } [ source { sour-addr sour-wildcard | any } | time-range time-name | fragment | logging ]* By default, a basic ACL does not contain any rule. 4. Exit the basic ACL view. quit N/A 5. Enter user interface view. user-interface [ type ] first-number [ last-number ] 6. Use the ACL to control user acl [ ipv6 ] acl-number { inbound | logins by source IP address. outbound } N/A • inbound: Filters incoming packets. • outbound: Filters outgoing packets. Configuring source/destination IP-based Telnet login control Step 1. Enter system view. 2. Create an advanced ACL and enter its view, or enter the view of an existing advanced ACL. Command system-view acl [ ipv6 ] number acl-number [ match-order { config | auto } ] 3. Configure an ACL rule. rule [ rule-id ] { permit | deny } rule-string Remarks N/A By default, no advanced ACL exists. N/A 65

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135

65
Controlling user logins
To harden device security, use ACLs to prevent unauthorized logins. For more information about ACLs,
see
ACL and QoS Configuration Guide.
Controlling Telnet logins
Use a basic ACL (2000 to 2999) to filter Telnet traffic by source IP address. Use an advanced ACL (3000
to 3999) to filter Telnet traffic by source and/or destination IP address. Use an Ethernet frame header
ACL (4000 to 4999) to filter Telnet traffic by source MAC address.
To access the device, a Telnet user must match a permit statement in the ACL applied to the user interface.
Configuring source IP-based Telnet login control
Step
Command
Remarks
1.
Enter system view.
system-view
N/A
2.
Create a basic ACL and
enter its view, or enter the
view of an existing basic
ACL.
acl
[
ipv6
]
number
acl-number
[
match-order
{
config
|
auto
} ]
By default, no basic ACL exists.
3.
Configure an ACL rule.
rule
[
rule-id
] {
permit
|
deny
}
[
source
{
sour-addr sour-wildcard
|
any
} |
time-range
time-name
|
fragment
|
logging
]*
By default, a basic ACL does not
contain any rule.
4.
Exit the basic ACL view.
quit
N/A
5.
Enter user interface view.
user-interface
[
type
]
first-number
[
last-number
]
N/A
6.
Use the ACL to control user
logins by source IP address.
acl
[
ipv6
]
acl-number
{
inbound
|
outbound
}
inbound
: Filters incoming
packets.
outbound
: Filters outgoing
packets.
Configuring source/destination IP-based Telnet login control
Step
Command
Remarks
1.
Enter system view.
system-view
N/A
2.
Create an advanced ACL and
enter its view, or enter the
view of an existing advanced
ACL.
acl
[
ipv6
]
number
acl-number
[
match-order
{
config
|
auto
} ]
By default, no advanced ACL
exists.
3.
Configure an ACL rule.
rule
[
rule-id
] {
permit
|
deny
}
rule-string
N/A