D-Link xStack DES-3228PA Web/Installation Manual page 111

Layer 2 stackable 10/100mbps ethernet switch with poe
Hide thumbs Also See for xStack DES-3228PA:
Table of Contents

Advertisement

Remove — Removes the selected access profile. The possible field values are:
Checked — Removes the selected access profile. Access Profiles cannot be removed when Active.
Unchecked — Maintains the access profiles.
2.
Click
. The Add Access Profile Page opens:
Figure 58: Add Access Profile Page
In addition to the fields in the Access Profile Page, the Add Access Profile Page contains the following fields:
Access Profile Name — Defines the access profile name. The access profile name can contain up to 32
characters.
Rule Priority — Defines the rule priority. When the packet is matched to a rule, user groups are either
granted permission or denied device management access. The rule number is essential to matching packets
to rules, as packets are matched on a first-fit basis. The rule priorities are assigned in the Profile Rules Page.
Management Method — Defines the management method for which the rule is defined. Users with this
access profile can access the device using the management method selected. The possible field values are:
All — Assigns all management methods to the rule.
Telnet — Assigns Telnet access to the rule. If selected, users accessing the device using Telnet meeting
access profile criteria are permitted or denied access to the device.
Secure Telnet (SSH) — Assigns SSH access to the rule. If selected, users accessing the device using
Telnet meeting access profile criteria are permitted or denied access to the device.
HTTP — Assigns HTTP access to the rule. If selected, users accessing the device using HTTP meeting
access profile criteria are permitted or denied access to the device.
Secure HTTP (HTTPS) — Assigns HTTPS access to the rule. If selected, users accessing the device
using HTTPS meeting access profile criteria are permitted or denied access to the device.
SNMP — Assigns SNMP access to the rule. If selected, users accessing the device using SNMP
meeting access profile criteria are permitted or denied access to the device.
Page 108
Configuring Device Security
Configuring Management Security

Advertisement

Table of Contents
loading

Table of Contents