Security
Management Access Method
348 Cisco Small Business 200, 300 and 500 Series Managed Switch Administration Guide (Internal Version)
18
-All—Applies to all ports, VLANs, and LAGs.
-User Defined—Applies to selected interface.
Interface—Enter the interface number if User Defined was selected.
Applies to Source IP Address—Select the type of source IP address to
which the access profile applies. The Source IP Address field is valid for a
subnetwork. Select one of the following values:
-All—Applies to all types of IP addresses.
-User Defined—Applies to only those typ es of IP addresses defined in
the fields.
IP Address—Enter the source IP address.
Mask—Select the format for the subnet mask for the source IP address, and
enter a value in one of the fields:
-

Network Mask

—Select the subnet to which the source IP address
belongs and enter the subnet mask in dotted decimal format.
-

Prefix Length

—Select the Prefix Length and enter the number of bits that
comprise the source IP address prefix.
STEP 7 Click Apply. The access profile is written to the Running Configuration file. You can
now select this access profile as the active access profile.
Defining Profile Rules
Access profi les can contai n up to 128 rules to determine who i s permitted to
manage and access the device, and the access methods that may be used.
Each rule in an access profile contains an action and criteria (one or more
parameters) to match. Each rule has a priority; rules with the lowest priority are
checked first. If the incoming packet matches a rule, the action associated with the
rule is performed. If no matching rule is found within the active access profile, the
packet is dropped.
For example, you can limit access to the device from all IP addresses except IP
addresses that are allocated to the IT management center. In this way, the device
can still be managed and has gained another layer of security.
To add profile rules to an access profile: