Defining Authentication Profiles - TP-Link TL-SG3109 User Manual

9-port gigabit managed switch/24+4g gigabit managed switch/48+4g gigabit managed switch embedded web system
Hide thumbs Also See for TL-SG3109:
Table of Contents

Advertisement

Prefix Length — Defines the number of bits that comprise the source IP address prefix, or the network mask of the
source IP address.
Action — Defines the action attached to the rule. The possible field values are:
– Permit — Permits access to the device.
– Deny — Denies access to the device. This is the default.
Remove — Removes rules from the selected access profiles. The possible field values are:
– Checked — Removes the selected rule from the access profile.
– Unchecked — Maintains the rules attached to the access profile.
2. Click
. The Add Profile Rule Page opens:
Figure 27: Add Profile Rule Page
3. Define the fields.
4. Click
. The profile rule is added to the access
profile, and the device is updated.
To modify a Profile Rule:
1. Click Security > Management Security >
Authentication > Access Profile. The Access Profile
Page opens.
2. Click
. The Profile Rule Settings Page opens:
Figure 28: Profile Rule Settings Page
3. Modify the fields.
4. Click
. The profile rule is modified, and the
device is updated.

5.1.1.3 Defining Authentication Profiles

Authentication profiles allow network administrators to assign authentication methods for user authentication. User
authentication can be performed either locally or on an external server. User authentication occurs in the order the methods
are selected. If the first authentication method is not available, the next selected method is used. For example, if the selected
authentication methods are RADIUS and Local, and the RADIUS server is not available, then the user is authenticated
locally.
To define Authentication profiles:
1. Click System > Management Security > Authentication > Authentication Profiles. The Authentication Profiles Page
opens:
Figure 29: Authentication Profiles Page
The Authentication Profiles Page provides the following
tables:
Login Authentication Profiles
Enable Authentication Profiles


Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Tl-sl3452Tl-sl3428

Table of Contents