D-Link xStack DXS-3250E Web/Installation Manual page 79

Dxs/dws-3200 series layer 2+ stackable gigabit ethernet switches with optional xg uplinks
Hide thumbs Also See for xStack DXS-3250E:
Table of Contents

Advertisement

DXS-3227, DXS-3227P, DXS-3250 and DXS-3250E EWS User Guide
Management Method — Defines the management method for which the rule is defined. Users with this
access profile can access the device using the management method selected. The possible field values are:
All — Assigns all management methods to the rule.
Telnet — Assigns Telnet access to the rule. If selected, users accessing the device using Telnet meeting
access profile criteria are permitted or denied access to the device.
Secure Telnet (SSH) — Assigns SSH access to the rule. If selected, users accessing the device using
Telnet meeting access profile criteria are permitted or denied access to the device.
HTTP — Assigns HTTP access to the rule. If selected, users accessing the device using HTTP meeting
access profile criteria are permitted or denied access to the device.
Secure HTTP (HTTPS) — Assigns HTTPS access to the rule. If selected, users accessing the device
using HTTPS meeting access profile criteria are permitted or denied access to the device.
SNMP — Assigns SNMP access to the rule. If selected, users accessing the device using SNMP
meeting access profile criteria are permitted or denied access to the device.
Interface — Defines the interface on which the access profile is defined. The possible field values are:
Port — Specifies the port on which the access profile is defined.
LAG — Specifies the LAG on which the access profile is defined.
VLAN — Specifies the VLAN on which the access profile is defined.
Source IP Address — Defines the interface source IP address to which the access profile applies. The
Source IP Address field is valid for a subnetwork.
Network Mask — Defines the Network Mask.
Prefix Length — Defines the number of bits that comprise the source IP address prefix, or the network mask
of the source IP address.
Action —Defines the action attached to the rule. The possible field values are:
Permit — Permits access to the device.
Deny — Denies access to the device. This is the default.
3.
Define the fields.
4.
Click
. The access profile is created, and the device is updated.
Page 78

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Xstack dxs-3227Xstack dxs-3227pXstack dxs-3250

Table of Contents