36
[Sysname] acl number 2000 match-order config
[Sysname-acl-basic-2000] rule 1 permit source 10.110.100.52 0
[Sysname-acl-basic-2000] rule 2 permit source 10.110.100.46 0
[Sysname-acl-basic-2000] quit
# Associate the ACL with the SNMP community and the SNMP group.
[Sysname] snmp-agent community read aaa acl 2000
[Sysname] snmp-agent group v2c groupa acl 2000
[Sysname] snmp-agent usm-user v2c usera groupa acl 2000
Configuring Web login control
Use a basic ACL (2000 to 2999) to filter HTTP/HTTPS traffic by source IP address, so only Web users
whose IP addresses are permitted by the ACL can access the device.
You can also log off suspicious Web users who have been logged in.
Configuring source IP-based Web login control
Step Command
Remarks
1.
Enter system view.
system-view
N/A
2.
Create a basic ACL and enter
its view, or enter the view of an
existing basic ACL.
acl
[
ipv6
]
number
acl-number
[
name
name
] [
match-order
{
config
|
auto
} ]
By default, no basic ACL exists.
3.
Create rules for this ACL.
rule
[
rule-id
] {
deny
|
permit
}
[
counting
|
fragment
|
logging
|
source
{
sour-addr sour-wildcard
|
any
} |
time-range
time-range-name
]
N/A
4.
Exit the basic ACL view.
quit
N/A
5.
Associate the HTTP service
with the ACL.
ip http acl
acl-number
Configure either or both of the
commands.
HTTP login and HTTPS login are
separate login methods. To use
HTTPS login, you do not need to
configure HTTP login.
6.
Associate the HTTPS service
with the ACL.
ip https acl
acl-number
Logging off online Web users
Task Command
Remarks
Log off online Web users.
free web-users
{
all
|
user-id
user-id
|
user-name
user-name
} Available in user interface view.