Netgear GS752TP GS728TP/GS728TPP/GS752TP Software Administration Manual - Page 175

In the Source IP Address field, In the Service Type field

Page 175 highlights

GS752TP, GS728TP, and GS728TPP Gigabit Smart Switches The following screen displays: 2. In the Rule Type field, select Permit or Deny as the action to be performed when the rule is matched. 3. In the Service Type field, select HTTP, Secure HTTP (SSL), or SNMP. The access rule is restricted according to the service type. 4. In the Source IP Address field, enter the IP address from which traffic is originated. 5. In the Mask field, enter the IP mask of the source IP addresses. 6. In the Priority field, enter a priority for the rule. The rules are validated against an incoming management request in the ascending order of their priorities. When a rule match is detected, the rule action is performed and subsequent rules are ignored. For example, if a source IP 10.10.10.10 is configured with priority 1 to permit, and source IP 10.10.10.10 is configured with priority 2 to deny, then access is permitted if the profile is active, and the second rule is ignored. 7. Click ADD. Make sure that the access profile is created before adding the rules.  To configure a security access rule: 1. Select the checkbox next to the security access rule to be modified. 2. Update the relevant fields. 3. Click APPLY to update the switch with the new settings. Managing Device Security 175

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275

Managing Device Security
175
GS752TP, GS728TP, and GS728TPP Gigabit Smart Switches
The following screen displays:
2.
In the Rule Type field, s
elect
Permit
or
Deny
as the action to be performed when the rule
is matched.
3.
In the Service Type field
, select
HTTP
,
Secure HTTP (SSL)
, or
SNMP
.
The access rule is restricted according to the service type.
4.
In the Source IP Address field
, enter the IP address from which traffic is originated.
5.
In the Mask field
, enter the IP mask of the source IP addresses.
6.
In the Priority field,
enter a priority for the rule.
The rules are validated against an incoming management request in the ascending order
of their priorities. When a rule match is detected, the rule action is performed and
subsequent rules are ignored. For example, if a source IP 10.10.10.10 is configured with
priority 1 to permit, and source IP 10.10.10.10 is configured with priority 2 to deny, then
access is permitted if the profile is active, and the second rule is ignored.
7.
Click
ADD
. Make sure that the access profile is created before adding the rules.
To configure a security access rule:
1.
Select the checkbox next to the security access rule to be modified.
2.
Update the relevant fields.
3.
Click
APPLY
to update the switch with the new settings.