D-Link DXS-3250E Installation Guide - Page 75
D-Link DXS-3250/DXS-3227P/DXS-3227 User Guide, Add Profile Rule Management Method
UPC - 790069308420
View all D-Link DXS-3250E manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 75 highlights
D-Link DXS-3250/DXS-3227P/DXS-3227 User Guide • Management Method - Defines the management method for which the rule is defined. Users with this access profile can access the device using the management method selected. The possible field values are: - All - Assigns all management methods to the rule. - Telnet - Assigns Telnet access to the rule. If selected, users accessing the device using Telnet meeting access profile criteria are permitted or denied access to the device. - Secure Telnet (SSH) - Assigns SSH access to the rule. If selected, users accessing the device using Telnet meeting access profile criteria are permitted or denied access to the device. - HTTP - Assigns HTTP access to the rule. If selected, users accessing the device using HTTP meeting access profile criteria are permitted or denied access to the device. - Secure HTTP (HTTPS) - Assigns HTTPS access to the rule. If selected, users accessing the device using HTTPS meeting access profile criteria are permitted or denied access to the device. - SNMP - Assigns SNMP access to the rule. If selected, users accessing the device using SNMP meeting access profile criteria are permitted or denied access to the device. • Source IP Address - Defines the interface source IP address to which the rule applies. • Prefix Length - Defines the number of bits that comprise the source IP address prefix, or the network mask of the source IP address. • Action -Defines the action attached to the rule. The possible field values are: - Permit - Permits access to the device. - Deny - Denies access to the device. This is the default. • Remove - Removes rules from the selected access profiles. The possible field values are: - Checked - Removes the selected rule from the access profile. - Unchecked - Maintains the rules attached to the access profile. 2. Click . The Add Profile Rule Page opens: Figure 31: Add Profile Rule Page 3. Define the Access Profile Name, Priority, Management Method, Interface, Source IP Address, Network Mask or Prefix Length, and Action fields. Page 75