Configuring Device Security
Configuring Management Security
–LAG — Attaches the rule to the selected LAG.
–VLAN — Attaches the rule to the selected VLAN.
•Management Method — Defines the management method for which the rule is defined. Users with this access profile can access the device using the management method selected. The possible field values are:
–All — Assigns all management methods to the rule.
–Telnet — Assigns Telnet access to the rule. If selected, users accessing the device using Telnet meeting access profile criteria are permitted or denied access to the device.
–Secure Telnet (SSH) — Assigns SSH access to the rule. If selected, users accessing the device using Telnet meeting access profile criteria are permitted or denied access to the device.
–HTTP — Assigns HTTP access to the rule. If selected, users accessing the device using HTTP meeting access profile criteria are permitted or denied access to the device.
–Secure HTTP (HTTPS) — Assigns HTTPS access to the rule. If selected, users accessing the device using HTTPS meeting access profile criteria are permitted or denied access to the device.
–SNMP — Assigns SNMP access to the rule. If selected, users accessing the device using SNMP meeting access profile criteria are permitted or denied access to the device.
•Source IP Address — Defines the interface source IP address to which the rule applies.
•Prefix Length — Defines the number of bits that comprise the source IP address prefix, or the network mask of the source IP address.
•Action
–Permit — Permits access to the device.
–Deny — Denies access to the device. This is the default.
•Remove — Removes rules from the selected access profiles. The possible field values are:
–Checked — Removes the selected rule from the access profile.
–Unchecked — Maintains the rules attached to the access profile.
2.Click . The Add Profile Rule Page opens:
Page 67