Figure 24: Access Profile Page

The Access Profile Page contains the following fields:

Access Profile Name — Defines the access profile name. The access profile name can contain up to 32 characters.

Active Profile — Defines the access profile currently active.

Remove — Removes the selected access profile. The possible field values are:

Checked — Removes the selected access profile. Access Profiles cannot be removed when Active.

Unchecked — Maintains the access profiles.

Disable Active Profile — Disables the active access profile. The possible field values are:

Checked — Disables the active access profiles.

Unchecked — Indicates the access profile is currently active. This is the default value.

2.Click . The Add Access Profile Page opens:

Figure 25: Add Access Profile Page

In addition to the fields in the Access Profile Page, the Add

Access Profile Page contains the following fields:

Access Profile Name — Defines a new access profile name.

Rule Priority — Defines the rule priority. When the packet is matched to a rule, user groups are either granted permission or denied device management access. The rule number is essential to matching

packets to rules, as packets are matched on a first-fit basis. The rule priorities are assigned in the Profile Rules Page.

Management Method — Defines the management method for which the rule is defined. Users with this access profile can access the device using the management method selected. The possible field values are:

All — Assigns all management methods to the rule.

Telnet — Assigns Telnet access to the rule. If selected, users accessing the device using Telnet meeting access profile criteria are permitted or denied access to the device.

Secure Telnet (SSH) — Assigns SSH access to the rule. If selected, users accessing the device using Telnet meeting access profile criteria are permitted or denied access to the device.

HTTP — Assigns HTTP access to the rule. If selected, users accessing the device using HTTP meeting access profile criteria are permitted or denied access to the device.

Secure HTTP (HTTPS) — Assigns HTTPS access to the rule. If selected, users accessing the device using HTTPS meeting access profile criteria are permitted or denied access to the device.

SNMP — Assigns SNMP access to the rule. If selected, users accessing the device using SNMP meeting access profile criteria are permitted or denied access to the device.

Interface — Defines the interface on which the access profile is defined. The possible field values are:

Port — Specifies the port on which the access profile is defined.

LAG — Specifies the LAG on which the access profile is defined.

VLAN — Specifies the VLAN on which the access profile is defined.

Source IP Address — Defines the interface source IP address to which the access profile applies. The Source IP Address field is valid for a subnetwork.

Network Mask — Defines the network mask of the source IP address.

2 2

Page 29
Image 29
TP-Link TL-SG3109, TL-SL3452, TL-SL3428 manual Click . The Add Access Profile Page opens

TL-SG3109, TL-SL3428, TL-SL3452 specifications

The TP-Link TL-SL3428 is a feature-rich Ethernet switch designed for small to medium-sized business environments. It is part of TP-Link’s JetStream series, which emphasizes reliability, performance, and robust management capabilities. Built with 28 10/100/1000 Mbps ports, the TL-SL3428 provides sufficient bandwidth to support a wide range of network applications.

One of the standout features of the TL-SL3428 is its support for Layer 2 management protocols. This allows for more granular control and optimized performance across network segments. The switch supports VLAN (Virtual Local Area Network) segmentation, which enhances network security and efficiency by isolating various types of traffic. This feature is particularly useful in larger organizations where different departments or teams may require separate network environments.

The TL-SL3428 also includes advanced QoS (Quality of Service) capabilities. This functionality prioritizes traffic based on predefined rules, which ensures that critical applications receive the necessary bandwidth to function optimally. With QoS implementation, users can experience minimized latency, leading to better performance in VoIP and video conferencing applications.

In terms of redundancy and reliability, the switch also supports Link Aggregation Control Protocol (LACP), enabling multiple connections to be combined for increased bandwidth and failover support. This feature significantly enhances network resilience, ensuring minimal downtime during failures.

Power over Ethernet (PoE) support is another important characteristic of the TL-SL3428. With PoE capabilities, this switch can deliver electrical power along with data over the same Ethernet cable, simplifying installation and reducing the need for additional wiring. This is especially advantageous for IP devices like cameras, access points, and VoIP phones.

Security features are abundant in the TL-SL3428 as well. It implements port security, storm control, and DHCP snooping, all of which contribute to a secure network infrastructure. The switch’s management capabilities can be accessed through a user-friendly web interface, making it easier for IT administrators to configure and monitor network activities.

Overall, the TP-Link TL-SL3428 is an exemplary choice for businesses looking to enhance their network performance with advanced management features, security protocols, and reliability. Its combination of speed, flexibility, and manageability make it a valuable tool for any growing organization.