Section 5. Configuring Device Security; Configuring Management Security; Configuring Authentication Methods; Defining Access Profiles - TP-Link TL-SG3109 User Manual

9-port gigabit managed switch/24+4g gigabit managed switch/48+4g gigabit managed switch embedded web system
Hide thumbs Also See for TL-SG3109:
Table of Contents

Advertisement

Section 5. Configuring Device Security

This section describes pages that contain fields for setting security parameters for ports, device management methods,
users, and server security for the TP-Link device.
This section contains the following topics:

Configuring Management Security

Configuring Network Security
5.1 Configuring Management Security
This section provides information for configuring device management security.
This section includes the following topics:

Configuring Authentication Methods

Configuring Passwords
5.1.1 Configuring Authentication Methods
This section provides information for configuring device authentication methods.
This section includes the following topics:

Defining Access Profiles

Defining Profile Rules
Defining Authentication Profiles
Mapping Authentication Profiles
Defining TACACS+ Host Settings
Defining RADIUS Server Settings
5.1.1.1 Defining Access Profiles
Access profiles are profiles and rules for accessing the device. Access to management functions can be limited to user
groups. User groups are defined for interfaces according to IP addresses or IP subnets. Access profiles contain management
methods for accessing and managing the device. The device management methods include:
All
Telnet
Secure Telnet (SSH)
HTTP
Management access to different management methods may differ between user groups. For example, User Group 1 can
access the switch module only via an HTTPS session, while User Group 2 can access the switch module via both HTTPS
and Telnet sessions. The Access Profile Page contains the currently configured access profiles and their activity status.
Assigning an access profile to an interface denies access via other interfaces. If an access profile is assigned to any interface,
the device can be accessed by all interfaces.
To configure access profiles:
1. Click System > Management Security > Authentication > Access Profiles. The Access Profile Page opens:
 

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Tl-sl3452Tl-sl3428

Table of Contents