Management Access Method - Cisco 350XG series Administration Manual

10g stackable managed switches
Table of Contents

Advertisement

Security

Management Access Method

STEP 4
STEP 5
Management Access Method
Cisco 350XG & 550XG Series 10G Stackable Managed Switches
-
User Defined—Life of the key-chain is limited. If this option, is selected
enter values in the following fields.
Start Date—Enter the earliest date that the key-identifier is valid.
Start Time—Enter the earliest time that the key-identifier is valid on the Start
Date.
End Time—Specifies the last date that the key-identifier is valid. Select one
of the following options.
-
Infinite—No limit to the life of the key-identifier.
-
Duration—Life of the key-identifier is limited. If this option, is selected
enter values in the following fields.
Duration—Length of time that the key identifier is valid. Enter the following
fields:
-
Days—Number of days that the key-identifier is valid.
-
Hours—Number of hours that the key-identifier is valid.
-
Minutes—Number of minutes that the key-identifier is valid.
-
Seconds—Number of seconds that the key-identifier is valid.
Click Apply. The settings are written to the Running Configuration file.
To always display sensitive data as plaintext (and not in encrypted form), click
Display Sensitive Data as Plaintext.
This section describes access rules for various management methods.
It covers the following topics:
Access Profile
Profile Rules
Access profiles determine how to authenticate and authorize users accessing the
device through various access methods. Access Profiles can limit management
access from specific sources.
19
403

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

550xg series

Table of Contents