TP-Link TL-SL3428, TL-SL3452, TL-SG3109 Defining Authentication Profiles, Add Profile Rule Page

Models: TL-SG3109 TL-SL3428 TL-SL3452

1 120
Download 120 pages 18.36 Kb
Page 31
Image 31
Figure 27: Add Profile Rule Page

Prefix Length — Defines the number of bits that comprise the source IP address prefix, or the network mask of the source IP address.

Action — Defines the action attached to the rule. The possible field values are:

Permit — Permits access to the device.

Deny — Denies access to the device. This is the default.

Remove — Removes rules from the selected access profiles. The possible field values are:

Checked — Removes the selected rule from the access profile.

Unchecked — Maintains the rules attached to the access profile.

2. Click 2.Click . The Profile Rule Settings Page opens:. The Add Profile Rule Page opens:

Figure 27: Add Profile Rule Page

3.Define the fields.

4.Click Figure 28: Profile Rule Settings Page. The profile rule is added to the access profile, and the device is updated.

To modify a Profile Rule:

1. Click Security > Management Security > Authentication > Access Profile. The Access Profile Page opens.

2.Click 5.1.1.3 Defining Authentication Profiles. The Profile Rule Settings Page opens:

Figure 28: Profile Rule Settings Page

3.Modify the fields.

4.Click Figure 29: Authentication Profiles Page. The profile rule is modified, and the device is updated.

5.1.1.3 Defining Authentication Profiles

Authentication profiles allow network administrators to assign authentication methods for user authentication. User authentication can be performed either locally or on an external server. User authentication occurs in the order the methods are selected. If the first authentication method is not available, the next selected method is used. For example, if the selected authentication methods are RADIUS and Local, and the RADIUS server is not available, then the user is authenticated locally.

To define Authentication profiles:

1.Click System > Management Security > Authentication > Authentication Profiles. The Authentication Profiles Page opens:

Figure 29: Authentication Profiles Page

The Authentication Profiles Page provides the following

tables:

Login Authentication Profiles

Enable Authentication Profiles

2 4

Page 31
Image 31
TP-Link TL-SL3428 Defining Authentication Profiles, Add Profile Rule Page, Click . The Profile Rule Settings Page opens