Manage Device Security
223
S350 Series 8-Port Gigabit Ethernet Smart Managed Pro Switch Models GS308T and GS310TP
The default password is password.
The System Information page displays.
5. Select Security
> Access > Access Control > Access Rule Configuration.
6. From the Rule Type menu, select Permit or Deny to permit or deny access when the
selected rules are matched.
A Permit rule allows access from a device that matches the rule criteria. A Deny rule
blocks a device that matches the rule criteria.
7. From the Service T
ype menu, select the access method to which the rule is applied.
The policy is restricted by the selected access method. Possible access methods are
TFTP, HTTP
, Secure HTTP (SSL), and SNMP.
8. In the Source IP Address field, enter the source IP address from which the management
traffic originates.
9. In the Mask field, specify the subnet mask from which the management traf
fic originates.
10. In the Priority field, assign a priority to the rule.
The rules are validated against the incoming management request in ascending order of
their priorities. If a rule matches, the action is performed and subsequent rules below that
rule are ignored. For example, if a source IP address 10.10.10.10 is configured with
priority 1 to permit, and the same source IP address 10.10.10.10 is also configured with
priority 2 to deny
, then access is permitted if the profile is active, and the second rule is
ignored.
11. Click the Add button.
The access rule is added.
Configure Port Authentication
With port-based authentication, when 802.1X is enabled globally and on the port, successful
authentication of any one supplicant attached to the port results in all users being able to use
the port without restrictions. At any time, only one supplicant is allowed to attempt
authentication on a port in this mode. Ports in this mode are under bidirectional control. This
is the default authentication mode.
An 802.1X network includes three components:
• Authenticator.
The port that is authenticated before access to system services is
permitted.
• Supplicant.
The host that is connected to the authenticated port requesting access to the
system services.