EasyManua.ls Logo

Cisco ESW 500 - Page 133

Cisco ESW 500
442 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Configuring Device Security
Defining Access Methods
ESW 500 Series Switches Administration Guide 122
5
Interface — Indicates the interface type to which the rule applies. The possible
field values are:
-
Port
— Attaches the rule to the selected port.
-
EtherChannel
— Attaches the rule to the selected EtherChannel.
-
VLAN
— Attaches the rule to the selected VLAN.
Management Method — Defines the management method for which the rule is
defined. Users with this access profile can access the device using the
management method selected. The possible field values are:
-
All
— Assigns all management methods to the rule.
-
Te l n e t
— Assigns Telnet access to the rule. If selected, users accessing
the device using Telnet meeting access profile criteria are permitted or
denied access to the device.
-
SNMP
— Assigns SNMP access to the rule. If selected, users accessing
the device using SNMP meeting access profile criteria are permitted or
denied access to the device.
-
HTTP
— Assigns HTTP access to the rule. If selected, users accessing
the device using HTTP meeting access profile criteria are permitted or
denied access to the device.
-
Secure HTTP (SSL)
— Assigns HTTPS access to the rule. If selected,
users accessing the device using HTTPS meeting access profile criteria
are permitted or denied access to the device.
-
Secure Telnet (SSH)
— Assigns SSH access to the rule. If selected,
users accessing the device using Telnet meeting access profile criteria
are permitted or denied access to the device.
Source IP Address — Defines the interface source IP address to which the rule
applies.
Prefix Length — Defines the number of bits that comprise the source IP
address prefix, or the network mask of the source IP address.
Action — Defines the action attached to the rule. The possible field values are:
-
Permit
— Permits access to the device.
-
Deny
— Denies access to the device. This is the default.
STEP 2 Click the Add button. The
Add Profile Rule Page
opens:

Table of Contents

Related product manuals