HP BladeSystem bc2800 Embedded Web System User Guide for the HP BladeSystem PC - Page 30

Defining Profile Rules

Page 30 highlights

Configuring Device Security Defining Profile Rules Access profiles can contain up to 128 rules that determine which users can manage the switch module, and by which methods. Users can also be blocked from accessing the device. Rules are composed of filters including: ■ Rule Priority ■ Interface ■ Management Method ■ IP Address ■ Prefix Length ■ Forwarding Action The rule order is essential as packets are matched on a first-fit basis. To define profile rules: 1. Click Management Security > Access Method > Profile Rules. The Profile Rules page opens: Profile Rules The Profile Rules page contains the following fields: ❏ Access Profile Name - Displays the access profile to which the rule is attached. ❏ Priority - Defines the rule priority. When the packet is matched to a rule, user groups are either granted or denied device management access. The rule number is essential to matching packets to rules, as packets are matched on a first-fit basis. ❏ Interface - Indicates the interface type to which the rule applies. The possible field values are: ◆ Port - Attaches the rule to the selected port. ◆ LAG - Attaches the rule to the selected LAG. 4-4 www.hp.com Embedded Web System User Guide

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216

4-4
www.hp.com
Embedded Web System User Guide
Configuring Device Security
Defining Profile Rules
Access profiles can contain up to 128 rules that determine which users can manage the switch
module, and by which methods. Users can also be blocked from accessing the device. Rules are
composed of filters including:
Rule Priority
Interface
Management Method
IP Address
Prefix Length
Forwarding Action
The rule order is essential as packets are matched on a first-fit basis.
To define profile rules:
1. Click
Management
Security > Access Method > Profile Rules
. The Profile Rules page
opens:
Profile Rules
The Profile Rules page contains the following fields:
Access Profile Name
— Displays the access profile to which the rule is attached.
Priority
— Defines the rule priority. When the packet is matched to a rule, user groups
are either granted or denied device management access. The rule number is essential to
matching packets to rules, as packets are matched on a first-fit basis.
Interface
— Indicates the interface type to which the rule applies. The possible field
values are:
Port
— Attaches the rule to the selected port.
LAG
— Attaches the rule to the selected LAG.