¾Access Control Config

Control Mode: Select the control mode for users to log on to the Web

 

management page.

 

z DisableDisable the access control function.

 

z IP-based:Select this option to limit the IP-range of the users

 

for login.

 

z MAC-based:Select this option to limit the MAC Address of the

 

users for login.

 

z Port-based:Select this option to limit the ports for login.

IP Address & Mask

These fields can be available for configuration only when IP-based

 

mode is selected. Only the users within the IP-range you set here

 

are allowed for login.

MAC Address:

The field can be available for configuration only when MAC-based

 

mode is selected. Only the user with this MAC Address you set

 

here is allowed for login.

Port:

The field can be available for configuration only when Port-based

 

mode is selected. Only the users connected to these ports you set

 

here are allowed for login.

¾Session Config

Session Timeout: If you do nothing with the Web management page within the

timeout time, the system will log out automatically. If you want to reconfigure, please login again.

¾Access User Number

Number Control: Select Enable/Disable the Number Control function.

Admin Number: Enter the maximum number of the users logging on to the Web management page as Admin.

Guest Number: Enter the maximum number of the users logging on to the Web management page as Guest.

4.4.2 SSL Config

SSL (Secure Sockets Layer), a security protocol, is to provide a secure connection for the application layer protocol (e.g. HTTP) communication based on TCP. SSL is widely used to secure the data transmission between the Web browser and servers. It is mainly applied through ecommerce and online banking.

SSL mainly provides the following services:

1.Authenticate the users and the servers based on the certificates to ensure the data are transmitted to the correct users and servers;

2.Encrypt the data transmission to prevent the data being intercepted;

3.Maintain the integrality of the data to prevent the data being altered in the transmission.

Adopting asymmetrical encryption technology, SSL uses key pair to encrypt/decrypt information. A key pair refers to a public key (contained in the certificate) and its corresponding private key. By

20

Page 27
Image 27
TP-Link TL-SG2008 manual SSL Config, IP Address & Mask, MAC Address, Port