–
All — Assigns all management methods to the rule.
–
Telnet — Assigns Telnet access to the rule. If selected, users accessing the device using Telnet meeting
access profile criteria are permitted or denied access to the device.
–
Secure Telnet (SSH) — Assigns SSH access to the rule. If selected, users accessing the device using
Telnet meeting access profile criteria are permitted or denied access to the device.
–
HTTP — Assigns HTTP access to the rule. If selected, users accessing the device using HTTP meeting
access profile criteria are permitted or denied access to the device.
–
Secure HTTP (HTTPS) — Assigns HTTPS access to the rule. If selected, users accessing the device
using HTTPS meeting access profile criteria are permitted or denied access to the device.
–
SNMP — Assigns SNMP access to the rule. If selected, users accessing the device using SNMP
meeting access profile criteria are permitted or denied access to the device.
•
Source IP Address — Defines the interface source IP address to which the rule applies.
•
Prefix Length — Defines the number of bits that comprise the source IP address prefix, or the network mask
of the source IP address.
•
Action —Defines the action attached to the rule. The possible field values are:
–
Permit — Permits access to the device.
–
Deny — Denies access to the device. This is the default.
•
Remove — Removes rules from the selected access profiles. The possible field values are:
–
Checked — Removes the selected rule from the access profile.
–
Unchecked — Maintains the rules attached to the access profile.
2.
Click
. The Add Profile Rule Page opens:
Figure 63: Add Profile Rule Page
3.
Define the Access Profile Name, Priority, Management Method, Interface, Source IP Address, Network Mask
or Prefix Length, and Action fields.
4.
Click
. The profile rule is added to the access profile, and the device is updated.
Page 112
Configuring Device Security
Configuring Management Security