Alcatel OS-LS-6224 User Manual page 129

User guide
Hide thumbs Also See for OS-LS-6224:
Table of Contents

Advertisement

• Rule Priority — Defines the rule priority. When the packet is matched to a rule,
user groups are either granted permission or denied device management access.
The rule number is essential to matching packets to rules, as packets are matched
on a first-fit basis. The rule priorities are assigned in the Profiles Rules Page.
• Management Method — Defines the management method for which the rule is
defined. Users with this access profile can access the device using the
management method selected. The possible field values are:
• All — Assigns all management methods to the rule.
• Telnet — Assigns Telnet access to the rule. If selected, users accessing the
device using Telnet meeting access profile criteria are permitted or denied
access to the device.
• Secure Telnet (SSH) — Assigns SSH access to the rule. If selected, users
accessing the device using Telnet meeting access profile criteria are permitted
or denied access to the device.
• HTTP — Assigns HTTP access to the rule. If selected, users accessing the
device using HTTP meeting access profile criteria are permitted or denied
access to the device.
• Secure HTTP (HTTPS) — Assigns HTTPS access to the rule. If selected, users
accessing the device using HTTPS meeting access profile criteria are permitted
or denied access to the device.
• SNMP — Assigns SNMP access to the rule. If selected, users accessing the
device using SNMP meeting access profile criteria are permitted or denied
access to the device.
• Interface — Defines the interface on which the access profile is defined. The
possible field values are:
• Port — Specifies the port on which the access profile is defined.
• LAG — Specifies the LAG on which the access profile is defined.
• VLAN — Specifies the VLAN on which the access profile is defined.
• Source IP Address — Defines the interface source IP address to which the
access profile applies. The Source IP Address field is valid for a subnetwork.
• Network Mask — The IP subnetwork mask.
• Prefix Length — The number of bits that comprises the source IP address prefix,
or the network mask of the source IP address.
• Action —Defines the action attached to the rule. The possible field values are:
• Permit — Permits access to the device.
• Deny — Denies access to the device. This is the default.
Web – Click System, WebViewMgmt, Authentication, Access Profiles, define the
fields, and click Apply.
Configuring Authentication Methods
3
105

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents