
119
Ste
Command
Remarks
3. Create rules for this ACL.
rule [ rule-id ] { deny | permit }
[ counting | fragment | logging |
source { sour-addr sour-wildcard |
any } | time-range
time-range-name | vpn-instance
vpn-instance-name ] *
N/A
4. Exit the basic ACL view.
quit N/A
5. Associate the HTTP service
with the ACL.
ip http acl acl-number
Configure either or both of the
commands.
HTTP login and HTTPS login are
separate login methods. To use
HTTPS login, you do not need to
configure HTTP login.
6. Associate the HTTPS service
with the ACL.
ip https acl acl-number
Logging off online Web users
Task Command
Remarks
Display the current login users.
display web users
Available in user interface view.
Log off online Web users.
free web-users { all | user-id
user-id | user-name user-name }
Available in user interface view.
Web login control configuration example
Network requirements
Configure the firewall in Figure 80 to provide Web access service only to Host B.
Figure 80 Network diagram
Configuration procedure
# Create ACL 2030, and configure rule 1 to permit packets sourced from Host B.
<Firewall> system-view
[Firewall] acl number 2030 match-order config
[Firewall-acl-basic-2030] rule 1 permit source 10.110.100.52 0
# Associate the ACL with the HTTP service so only the Web users on Host B can access the firewall.
Host B
10.110.100.52
Firewall
IP network
Host A
10.110.100.46
Comentários a estes Manuais