EasyManua.ls Logo

Cisco Small Business 200 Series

Cisco Small Business 200 Series
337 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Security
Management Access Method
Cisco Small Business 200 Series Smart Switch Administration Guide 251
19
When a user attempts to access the device through an access method, the device looks to see if the active
access profile explicitly permits management access to the device through this method. If no match is
found, access is denied.
When an attempt to access the device is in violation of the active access profile, the device generates a
SYSLOG message to alert the system administrator of the attempt.
For more information see Defining Profile Rules.
Use the Access Profiles page to create an access profile and to add its first rule. If the access profile only
contains a single rule, you are finished. To add additional rules to the profile, use the Profile Rules page.
STEP 1 Click Security > Mgmt Access Method > Access Profiles.
This page displays all of the access profiles, active and inactive.
STEP 2 To change the active access profile, select a profile from the Active Access
Profile drop down menu and click Apply. This makes the chosen profile the active
access profile.
A caution message displays if you selected any other access profile, warning you that, depending on the
selected access profile, you might be disconnected from the web-based configuration utility.
STEP 3 Click OK to select the active access profile or click Cancel to discontinue the
action.
STEP 4 Click Add to open the Add Access Profile page. The page allows you to configure
a new profile and one rule.
STEP 5 Enter the Access Profile Name. This name can contain up to 32 characters.
STEP 6 Enter the parameters.
• Rule Priority—Enter the rule priority. When the packet is matched to a rule, user groups are either
granted or denied access to the device. The rule priority is essential to matching packets to rules, as
packets are matched on a first-match basis. One is the highest priority.
• Management Method—Select the management method for which the rule is defined. The options
are:
- All—Assigns all management methods to the rule.
- HTTP— Users requesting access to the device that meets the HTTP access profile criteria, are
permitted or denied.
- Secure HTTP (HTTPS)—Users requesting access to the device that meets the HTTPS access
profile criteria, are permitted or denied.

Table of Contents

Other manuals for Cisco Small Business 200 Series

Related product manuals