D-Link Web Smart DES-3252P Install Manual page 112

Layer 2 switch managed 48-port 10/100base-tx poe with gigabit uplinks
Hide thumbs Also See for Web Smart DES-3252P:
Table of Contents

Advertisement

All — Assigns all management methods to the rule.
Telnet — Assigns Telnet access to the rule. If selected, users accessing the device using Telnet meeting
access profile criteria are permitted or denied access to the device.
Secure Telnet (SSH) — Assigns SSH access to the rule. If selected, users accessing the device using
Telnet meeting access profile criteria are permitted or denied access to the device.
HTTP — Assigns HTTP access to the rule. If selected, users accessing the device using HTTP meeting
access profile criteria are permitted or denied access to the device.
Secure HTTP (HTTPS) — Assigns HTTPS access to the rule. If selected, users accessing the device
using HTTPS meeting access profile criteria are permitted or denied access to the device.
SNMP — Assigns SNMP access to the rule. If selected, users accessing the device using SNMP
meeting access profile criteria are permitted or denied access to the device.
Source IP Address — Defines the interface source IP address to which the rule applies.
Prefix Length — Defines the number of bits that comprise the source IP address prefix, or the network mask
of the source IP address.
Action —Defines the action attached to the rule. The possible field values are:
Permit — Permits access to the device.
Deny — Denies access to the device. This is the default.
Remove — Removes rules from the selected access profiles. The possible field values are:
Checked — Removes the selected rule from the access profile.
Unchecked — Maintains the rules attached to the access profile.
2.
Click
. The Add Profile Rule Page opens:
Figure 63: Add Profile Rule Page
3.
Define the Access Profile Name, Priority, Management Method, Interface, Source IP Address, Network Mask
or Prefix Length, and Action fields.
4.
Click
. The profile rule is added to the access profile, and the device is updated.
Page 112
Configuring Device Security
Configuring Management Security

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents