EasyManua.ls Logo

Linksys LGS308

Linksys LGS308
209 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
148
Source IP AddressIP addresses or subnets. Access to management methods might
differ among user groups. For example, one user group might be able to access the device
module only by using an HTTPS session, while another user group might be able to access
the device module by using both HTTPS and Telnet sessions.
The Access Profile page displays the access profiles that are defined and enables selecting one
access profile to be the active one.
When a user attempts to access the device through an access method, the device looks to see if
the active access profile explicitly permits management access to the device through this
method. If no match is found, access is denied.
When an attempt to access the device is in violation of the active access profile, the device
generates a SYSLOG message to alert the system administrator of the attempt.
If a console-only access profile has been activated, the only way to deactivate it is through a
direct connection from the management station to the physical console port on the device.
Use the Access Profiles page to create an access profile and to add its first rule. If the access
profile only contains a single rule, you are finished. To add additional rules to the profile, use the
Profile Rules page.
1.
Click Configuration > Security > Management Security > Access Profile.
This page displays all of the access profiles, active and inactive.
2.
To change the active access profile, select a profile from the Active Access Profile drop
down menu and click Apply. This makes the chosen profile the active access profile.
NoteA caution message appears if you selected Console Only. If you continue, you are
immediately disconnected from the web-based configuration utility and can access the
device only through the console port. This only applies to device types that offer a console
port.
3.
Click OK to select the active access profile or click Cancel to discontinue the action.
4.
Click Add to open the Add Access Profile page. The page allows you to configure a new
profile and one rule.
5.
Enter the Access Profile Name. This name can contain up to 32 characters.
6.
Enter the new rule parameters.
Rule PriorityEnter the rule priority. When the packet is matched to a rule, user
groups are either granted or denied access to the device. The rule priority is
essential to matching packets to rules, as packets are matched on a first-match
basis. One is the highest priority.
Management Access MethodSelect the management method for which the rule
is defined. The options are:
AllAssigns all management methods to the rule.

Table of Contents

Related product manuals