TP-Link T1500 Series User Manual page 512

Hide thumbs Also See for T1500 Series:
Table of Contents

Advertisement

Configuring Access Security
1
Access Security
1.1 Overview
Access Security provides different security measures for accessing the switch remotely
so as to enhance the configuration management security.
1.2 Supported Features
Access Control
This function is used to control the users' access to the switch based on IP address, MAC
address or port.
HTTP
This function is based on the HTTP protocol. It can allow or deny users to access the switch
via a web browser.
HTTPS
This function is based on the SSL or TLS protocol working in transport layer. It supports a
security access via a web browser.
SSH
This function is based on the SSH protocol, a security protocol established on application
and transport layers. The function with SSH is similar to a telnet connection, but SSH can
provide information security and powerful authentication.
Telnet
This function is based on the Telnet protocol subjected to TCP/IP protocol. Through Telnet,
users can log on to the switch remotely.
Access Security
Configuration Guide
490

Advertisement

Table of Contents
loading

Table of Contents