◆
All — Assigns all management methods to the rule.
◆
Telnet — Assigns Telnet access to the rule. If selected, users accessing the device
using Telnet meeting access profile criteria are permitted or denied access to the
device.
◆
Secure Telnet (SSH) — Assigns SSH access to the rule. If selected, users accessing
the device using Telnet, meeting access profile criteria, are permitted or denied
access to the device.
◆
HTTP — Assigns HTTP access to the rule. If selected, users accessing the device
using HTTP, meeting access profile criteria, are permitted or denied access to the
device.
◆
Secure HTTP (HTTPS) — Assigns HTTPS access to the rule. If selected, users
accessing the device using HTTPS, meeting access profile criteria, are permitted or
denied access to the device.
◆
SNMP — Assigns SNMP access to the rule. If selected, users accessing the device
using SNMP, meeting access profile criteria, are permitted or denied access to the
device.
❏
Interface — Defines the interface on which the access profile is defined. The possible
field values are:
◆
Port — Specifies the port on which the access profile is defined.
◆
LAG — Specifies the LAG on which the access profile is defined.
◆
VLAN — Specifies the VLAN on which the access profile is defined.
❏
Source IP Address — Defines the interface source IP address to which the access
profile applies. The Source IP Address field is valid for a subnetwork.
◆
Network Mask — Defines the IP subnetwork mask.
◆
Prefix Length — Defines the number of bits that comprises the source IP address
prefix, or the network mask of the source IP address.
❏
Action — Defines the action attached to the rule. The possible field values are:
◆
Permit — Permits access to the device.
◆
Deny — Denies access to the device. This is the default.
3. Define the fields.
4. Click
Embedded Web System User Guide
. The access profile is created, and the device is updated.
www.hp.com
Configuring Device Security
4-3