TP-Link TL-SL3452, TL-SL3428, TL-SG3109 manual Defining Profile Rules, Profile Rules Page

Models: TL-SG3109 TL-SL3428 TL-SL3452

1 120
Download 120 pages 18.36 Kb
Page 30
Image 30
5.1.1.2 Defining Profile Rules

Prefix Length — Defines the number of bits that comprise the source IP address prefix, or the network mask of the source IP address.

Action —Defines the action attached to the access rule. The possible field values are:

Permit — Permits access to the device.

Deny — Denies access to the device. This is the default.

3. Click Figure 26: Profile Rules Page. The access profile is saved and the device is updated.

5.1.1.2 Defining Profile Rules

Access profiles can contain up to 128 rules that determine which users can manage the switch module, and by which methods. Users can also be blocked from accessing the device. Rules are composed of filters including:

Rule Priority

Interface

Management Method

IP Address

Prefix Length

Forwarding Action

To define profile rules:

1.Click System > Management Security > Authentication > Profile Rules. The Profile Rules Page opens:

Figure 26: Profile Rules Page

The Profile Rules Page contains the following fields:

Access Profile Name — Displays the access profile to which the rule is attached.

Priority — Defines the rule priority. When the packet is matched to a rule, user groups are either granted per- mission or denied device management access. The

rule number is essential to matching packets to rules, as packets are matched on a first-fit basis.

Interface — Indicates the interface type to which the rule applies. The possible field values are:

Port — Attaches the rule to the selected port.

LAG — Attaches the rule to the selected LAG.

VLAN — Attaches the rule to the selected VLAN.

Management Method — Defines the management method for which the rule is defined. Users with this access profile can access the device using the management method selected. The possible field values are:

All — Assigns all management methods to the rule.

Telnet — Assigns Telnet access to the rule. If selected, users accessing the device using Telnet meeting access profile criteria are permitted or denied access to the device.

Secure Telnet (SSH) — Assigns SSH access to the rule. If selected, users accessing the device using Telnet meeting access profile criteria are permitted or denied access to the device.

HTTP — Assigns HTTP access to the rule. If selected, users accessing the device using HTTP meeting access profile criteria are permitted or denied access to the device.

Secure HTTP (HTTPS) — Assigns HTTPS access to the rule. If selected, users accessing the device using HTTPS meeting access profile criteria are permitted or denied access to the device.

SNMP — Assigns SNMP access to the rule. If selected, users accessing the device using SNMP meeting access profile criteria are permitted or denied access to the device.

Source IP Address — Defines the interface source IP address to which the rule applies.

2 3

Page 30
Image 30
TP-Link TL-SL3452, TL-SL3428, TL-SG3109 manual Defining Profile Rules, Profile Rules Page