Table 5-15. Profile Summary Fields (continued)
Field
Source IP Address
Mask
Priority
2. Click Refresh to update the page with the most current information.
3. Click Cancel to cancel the configuration on the screen and reset the data on the screen to the
latest value of the switch.
4. If you change any of the settings on the page, click Apply to send the updated configuration to
the switch. Configuration changes take effect immediately.
Access Rule Configuration
Use the Access Rule Configuration page to configure the rules about what systems can access the
GS716T and GS724T Web interface and what protocols are allowed.
To access the Access Rule Configuration page:
1. Click Security Access, and then click the Access Control Access Rule Configuration
link.
Figure 5-13
Managing Device Security
GS716Tv2 and GS724Tv3 Software Administration Manual
Description
Shows the IP Address of the client that may or may not originate
management traffic.
Shows the subnet mask associated with the IP address.
Shows the priority of the rule. The rules are validated against the
incoming management request in the ascending order of their priorities.
If a rule matches, action is performed and subsequent rules below are
ignored.
v1.0, July 2009
5-21