Access Control - NETGEAR S3300 User Manual

Smart managed pro
Hide thumbs Also See for S3300:
Table of Contents

Advertisement

Access Control

Access control allows you to configure a profile and set access rules.
Access Profile Configuration
Use the Access Profile Configuration screen to set up a security access profile.
To configure an access profile:
1.
Select Security > Access > Access Control > Access Profile Configuration.
2.
In the Access Profile Name field, specify the name of the access profile to be added.
3.
Select one of the following options:
Activate Profile. Activate an access profile.
Deactivate Profile. Deactivate an access profile.
Remove Profile. Remove an access profile. The access profile should be
deactivated before removing the access profile.
4.
Click the Apply button.
The following table describes the access profile status information and the profile summary
information the screen displays.
Table 88. Access Profile Configuration
Field
Packets Filtered
Profile Summary
Rule Type
Service Type
Source IP Address
Mask
Priority
Access Rule Configuration
Use the Access Rule Configuration screen to add security access rules.
To configure access rules:
1.
Select Security > Access > Access Control > Access Rule Configuration.
S3300 Smart Managed Pro Switch
Description
The number of packets filtered.
The action to be performed when the rules selected are matched.
The policy is restricted by the management chosen from the list. Possible methods
include HTTP, Secure HTTP (SSL), and SNMP.
The Source IP Address of the client originating the management traffic.
The Source IP Address Mask of the client originating the management traffic.
The rule priority value. The rules are validated against the incoming management
request in the ascending order of their priorities. If a rule matches, action is
performed and subsequent rules below are ignored. For example, if a Source IP
10.10.10.10 is configured with priority 1 to permit, and Source IP 10.10.10.10 is
configured with priority 2 to Deny, then access is permitted if the profile is active,
and the second rule is ignored.
Managing Device Security
256

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents