Linksys SGE2000 Cisco SGE2000, SGE2000P Gigabit Ethernet Switch Reference Guid - Page 66
Security Suite, Access Method, Profile Rules, Access Profile Name, Priority, Management Method
UPC - 745883572120
View all Linksys SGE2000 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 66 highlights
Chapter 4 SGE2000/SGE2000P Gigabit Ethernet Switch Reference Guide Modifying Profile Rules 1. Click Security Suite > Access Method > Profile Rules. The Profile Rules Page opens: 2. Click the Edit button. The Edit Profile Rule Page opens: Edit Profile Rule Page The Edit Profile Rule Page contains the following fields: • Access Profile Name - Defines the access profile name. The access profile name can contain up to 32 characters. • Priority - Defines the rule priority. When the packet is matched to a rule, user groups are either granted permission or denied device management access. The rule number is essential to matching packets to rules, as packets are matched on a first-fit basis. The rule priorities are assigned in the Profile Rules Page. • Management Method - Defines the management method for which the rule is defined. Users with this access profile can access the device using the management method selected. The possible field values are: - All - Assigns all management methods to the rule. - Telnet - Assigns Telnet access to the rule. If selected, users accessing the device using Telnet meeting access profile criteria are permitted or denied access to the device. - Secure Telnet (SSH) - Assigns SSH access to the rule. If selected, users accessing the device using Telnet meeting access profile criteria are permitted or denied access to the device. - HTTP - Assigns HTTP access to the rule. If selected, users accessing the device using HTTP meeting access profile criteria are permitted or denied access to the device. - Secure HTTP (HTTPS) - Assigns HTTPS access to the rule. If selected, users accessing the device using HTTPS meeting access profile criteria are permitted or denied access to the device. 58 Chapter 4: Configuring Device Security Defining Access Method