D-Link Web Smart DES-3252P Install Manual page 109

Layer 2 switch managed 48-port 10/100base-tx poe with gigabit uplinks
Hide thumbs Also See for Web Smart DES-3252P:
Table of Contents

Advertisement

Remove — Removes the selected access profile. The possible field values are:
Checked — Removes the selected access profile. Access Profiles cannot be removed when Active.
Unchecked — Maintains the access profiles.
2.
Click
. The Add Access Profile Page opens:
Figure 61: Add Access Profile Page
In addition to the fields in the Access Profile Page, the Add Access Profile Page contains the following fields:
Access Profile Name — Defines the access profile name. The access profile name can contain up to 32
characters.
Rule Priority — Defines the rule priority. When the packet is matched to a rule, user groups are either
granted permission or denied device management access. The rule number is essential to matching packets
to rules, as packets are matched on a first-fit basis. The rule priorities are assigned in the Profile Rules Page.
Management Method — Defines the management method for which the rule is defined. Users with this
access profile can access the device using the management method selected. The possible field values are:
All — Assigns all management methods to the rule.
Telnet — Assigns Telnet access to the rule. If selected, users accessing the device using Telnet meeting
access profile criteria are permitted or denied access to the device.
Secure Telnet (SSH) — Assigns SSH access to the rule. If selected, users accessing the device using
Telnet meeting access profile criteria are permitted or denied access to the device - Otherwise, there is
no difference between definitions for Telnet and Secure Telnet.
HTTP — Assigns HTTP access to the rule. If selected, users accessing the device using HTTP meeting
access profile criteria are permitted or denied access to the device.
Secure HTTP (HTTPS) — Assigns HTTPS access to the rule. If selected, users accessing the device
using HTTPS meeting access profile criteria are permitted or denied access to the device.
SNMP — Assigns SNMP access to the rule. If selected, users accessing the device using SNMP
meeting access profile criteria are permitted or denied access to the device.
Page 109
Configuring Device Security
Configuring Management Security

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents