HP BladeSystem bc2800 Embedded Web System User Guide for the HP BladeSystem PC - Page 31

Access Profile Name, Priority

Page 31 highlights

Configuring Device Security ◆ VLAN - Attaches the rule to the selected VLAN. ❏ Management Method - Defines the management method for which the rule is defined. Users with this access profile can access the device using the management method selected. The possible field values are: ◆ All - Assigns all management methods to the rule. ◆ Telnet - Assigns Telnet access to the rule. If selected, users accessing the device using Telnet, meeting access profile criteria, are permitted or denied access to the device. ◆ Secure Telnet (SSH) - Assigns SSH access to the rule. If selected, users accessing the device using Telnet, meeting access profile criteria, are permitted or denied access to the device. ◆ HTTP - Assigns HTTP access to the rule. If selected, users accessing the device using HTTP, meeting access profile criteria, are permitted or denied access to the device. ◆ Secure HTTP (HTTPS) - Assigns HTTPS access to the rule. If selected, users accessing the device using HTTPS, meeting access profile criteria, are permitted or denied access to the device. ◆ SNMP - Assigns SNMP access to the rule. If selected, users accessing the device using SNMP, meeting access profile criteria, are permitted or denied access to the device. ❏ Source IP Address - Defines the interface source IP address to which the rule applies. ❏ Prefix Length - Defines the number of bits that comprise the source IP address prefix, or the network mask of the source IP address. ❏ Action -Defines the action attached to the rule. The possible field values are: ◆ Permit - Permits access to the device. ◆ Deny - Denies access to the device. This is the default. 2. Click . Add Profile Rule 3. Define the Access Profile Name, Priority, Management Method, Interface, Source IP Address, Network Mask or Prefix Length, and Action fields. 4. Click updated. . The profile rule is added to the access profile, and the device is Embedded Web System User Guide www.hp.com 4-5

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216

Embedded Web System User Guide
www.hp.com
4-5
Configuring Device Security
VLAN
— Attaches the rule to the selected VLAN.
Management Method
— Defines the management method for which the rule is defined.
Users with this access profile can access the device using the management method
selected. The possible field values are:
All
— Assigns all management methods to the rule.
Telnet
— Assigns Telnet access to the rule. If selected, users accessing the device
using Telnet, meeting access profile criteria, are permitted or denied access to the
device.
Secure Telnet (SSH)
— Assigns SSH access to the rule. If selected, users accessing
the device using Telnet, meeting access profile criteria, are permitted or denied
access to the device.
HTTP
— Assigns HTTP access to the rule. If selected, users accessing the device
using HTTP, meeting access profile criteria, are permitted or denied access to the
device.
Secure HTTP (HTTPS)
— Assigns HTTPS access to the rule. If selected, users
accessing the device using HTTPS, meeting access profile criteria, are permitted or
denied access to the device.
SNMP
— Assigns SNMP access to the rule. If selected, users accessing the device
using SNMP, meeting access profile criteria, are permitted or denied access to the
device.
Source IP Address
— Defines the interface source IP address to which the rule applies.
Prefix Length
— Defines the number of bits that comprise the source IP address prefix,
or the network mask of the source IP address.
Action
—Defines the action attached to the rule. The possible field values are:
Permit
— Permits access to the device.
Deny
— Denies access to the device. This is the default.
2. Click
.
Add Profile Rule
3. Define the
Access Profile Name, Priority
,
Management Method
,
Interface
,
Source IP
Address
,
Network Mask
or
Prefix Length
, and
Action
fields.
4. Click
. The profile rule is added to the access profile, and the device is
updated.