EasyManuals Logo

TP-Link Jetstream TL-SL2428P User Manual

TP-Link Jetstream TL-SL2428P
861 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #528 background imageLoading...
Page #528 background image
Configuring Access Security Access Security
User Guide 505
1
Access Security
1.1 Overview
Access Security provides different security measures for accessing the switch remotely
so as to enhance the configuration management security.
1.2 Supported Features
Access Control
This function is used to control the users’ access to the switch based on IP address, MAC
address or port.
HTTP
This function is based on the HTTP protocol. It can allow or deny users to access the switch
via a web browser.
HTTPS
This function is based on the SSL or TLS protocol working in transport layer. It supports a
security access via a web browser.
SSH
This function is based on the SSH protocol, a security protocol established on application
and transport layers. The function with SSH is similar to a telnet connection, but SSH can
provide information security and powerful authentication.
Telnet
This function is based on the Telnet protocol subjected to TCP/IP protocol. Through Telnet,
users can log on to the switch remotely.
Downloaded from ManualsNet.com search engine

Table of Contents

Other manuals for TP-Link Jetstream TL-SL2428P

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the TP-Link Jetstream TL-SL2428P and is the answer not in the manual?

TP-Link Jetstream TL-SL2428P Specifications

General IconGeneral
BrandTP-Link
ModelJetstream TL-SL2428P
CategorySwitch
LanguageEnglish

Related product manuals