[Sysname] acl number 2000 match-order config
[Sysname-acl-basic-2000] rule 1 permit source 10.110.100.52 0
[Sysname-acl-basic-2000] rule 2 permit source 10.110.100.46 0
[Sysname-acl-basic-2000] quit
# Associate the ACL with the SNMP community and the SNMP group.
[Sysname] snmp-agent community read aaa acl 2000
[Sysname] snmp-agent group v2c groupa acl 2000
[Sysname] snmp-agent usm-user v2c usera groupa acl 2000
Configuring Web login control
Use a basic ACL (2000 to 2999) to filter HTTP/HTTPS traffic by source IP address for Web login control.
To access the device, a Web user must use an IP address permitted by the ACL.
You can also log off suspicious Web users that have been logged in.
Configuring source IP-based Web login control
Step
1.
Enter system view.
2.
Create a basic ACL and enter
its view, or enter the view of
an existing basic ACL.
3.
Create rules for this ACL.
4.
Exit the basic ACL view.
5.
Associate the HTTP service
with the ACL.
6.
Associate the HTTPS service
with the ACL.
Logging off online Web users
Task
Log off online Web users.
Web login control configuration example
Network requirements
Configure the device in
Command
system-view
acl [ ipv6 ] number acl-number
[ name name ] [ match-order
{ config | auto } ]
rule [ rule-id ] { deny | permit }
[ counting | fragment | logging |
source { sour-addr sour-wildcard |
any } | time-range
time-range-name | vpn-instance
vpn-instance-name ] *
quit
ip http acl acl-number
ip https acl acl-number
Command
free web-users { all | user-id
user-id | user-name user-name }
Figure 43
to provide Web access service only to Host B.
81
Remarks
N/A
By default, no basic ACL exists.
N/A
N/A
Configure either or both of the
commands.
HTTP login and HTTPS login are
separate login methods. To use
HTTPS login, you do not need to
configure HTTP login.
Remarks
Available in user interface view.