Dell 3348 Switch User Manual


 
Configuring System Information 145
Management Method—Specifies the management method for which the access
profile is defined. The possible field values:
All—Indicates all management methods are assigned to the Access Profile. Users
with this Access Profile can access the device using all management methods.
Telnet—Indicates all Telnet sessions are assigned to the Access Profile. Users with
this Access Profile access the device using the Telnet management method.
Secure Telnet—Indicates Secure Telnet sessions are assigned to the Access Profile.
Users with this Access Profile access the device using the Secure Telnet
management method.
HTTP—Indicates HTTP sessions are assigned to the Access Profile. Users with
this Access Profile access the device using the HTTP management method.
Secure HTTP—Indicates Secure HTTP sessions are assigned to the Access
Profile. Users with this Access Profile access the device using the Secure HTTP
management method.
SNMP—Indicates SNMP sessions are assigned to the Access Profile. Users with
this Access Profile access the device using the SNMP management method.
Interface—Specifies the interface to which the rule applies. The possible field values
are:
Port—Indicates the interface is a port, and the specific port for which the Access
Profile is defined.
LAG —Indicates the interface is a LAG, and the specific LAG for which the
Access Profile is defined.
VLAN—Indicates the interface is a VLAN, and the specific VLAN for which the
Access Profile is defined.
Source IP Address—Indicates the interface source IP address to which the packet is
matched.
Network Mask—Indicates the interface network mask to which the packet is matched.
Prefix Length—Indicates the prefix length to which the packet is matched.
Action—Defines the Management Security Rule action. The possible field values are:
Permit—Permits management access to the defined interface.
Deny—Denies management access to the defined interface.
3 Define the Access Profile Name field.
4 Define the Rule Priority, Management Method, Interface, Source IP, Network Mask,
Prefix Length, and Action fields.