Configuring Management Security; Defining Access Profiles - Allied Telesis AT-S94 User Manual

Layer 2 ethernet switch
Hide thumbs Also See for AT-S94:
Table of Contents

Advertisement

Configuring Management Security

This section provides information for configuring device management security, device authentication methods,
users and passwords.
This section includes the following topics:

Defining Access Profiles

Defining Profile Rules
Defining Authentication Profiles
Mapping Authentication Profiles
Defining Access Profiles
Access profiles are profiles and rules for accessing the device. Access to management functions can be limited to
user groups. User groups are defined for interfaces according to IP addresses or IP subnets. Access profiles
contain management methods for accessing and managing the device. The device management methods
include:
All
Telnet
Secure Telnet (SSH)
HTTP
Secure HTTP (HTTPS)
Management access to different management methods may differ between user groups. For example, User
Group 1 can access the device module only via an HTTPS session, while User Group 2 can access the device
module via both HTTPS and Telnet sessions. The Access Profile Page contains the currently configured access
profiles and their activity status.
Assigning an access profile to an interface denies access via other interfaces. If an access profile is assigned to
any interface, the device can be accessed by all interfaces.
To define access profiles:
1.
Click Mgmt. Security > Access Profile. The Access Profile Page opens:
Page 26
Configuring Device Security
Configuring Management Security

Advertisement

Table of Contents
loading

Table of Contents