Configuring Access Profiles - Cisco 220 Series Smart Plus Administration Manual

Hide thumbs Also See for 220 Series Smart Plus:
Table of Contents

Advertisement

Configuring Security
Configuring Management Access Methods
STEP 1
STEP 2
STEP 3
STEP 4
Cisco 220 Series Smart Plus Switches Administration Guide Release 1.0.0.x

Configuring Access Profiles

Use the Access Profiles page to create an access profile and to add its first rule. If
the access profile only contains a single rule, you are finished. To add additional
rules to the profile, use the Profile Rules page.
To add an access profile or select a different active access profile:
Click Security > Management Access Method > Access Profiles.
The Access Profles Table displays all of the access profiles, active and inactive.
To change the active access profile, select a profile from the Active Access
Profile drop-down menu and click Apply. This makes the selected profile as the
active access profile.
A caution message appears if you selected Console Only. If you continue,
NOTE
you are immediately disconnected from the web-based interface and can access
the switch only through the console port. This only applies to device types that
offer a console port.
A caution message appears if you selected any other access profile, warning you
that, depending on the selected access profile, you might be disconnected from
the web-based interface.
Click Add to add a new access profile and one rule.
Enter the following information:
Access Profile Name—Enter an access profile name.
Rule Priority—Enter the rule priority. When the packet is matched to a rule,
user groups are either granted or denied access to the switch. The rule
priority is essential to matching packets to rules, as packets are matched on
a first-match basis. One is the highest priority.
Management Method—Select the management method for which the rule
is defined. Users with this access profile can only access the switch by using
the management method selected. The options are:
-
All
—Assigns all management methods to the rule.
Telnet
-
—Users requesting access to the switch who meet the Telnet
access profile criteria, are permitted or denied access.
Secure Telnet (SSH)
-
the SSH access profile criteria, are permitted or denied access.
—Users requesting access to the switch who meet
16
188

Advertisement

Table of Contents
loading

Table of Contents