Configuring System Information 145
• Management Method—Specifies the management method for which the access
profile is defined. The possible field values:
– All—Indicates all management methods are assigned to the Access Profile. Users
with this Access Profile can access the device using all management methods.
– Telnet—Indicates all Telnet sessions are assigned to the Access Profile. Users with
this Access Profile access the device using the Telnet management method.
– Secure Telnet—Indicates Secure Telnet sessions are assigned to the Access Profile.
Users with this Access Profile access the device using the Secure Telnet
management method.
– HTTP—Indicates HTTP sessions are assigned to the Access Profile. Users with
this Access Profile access the device using the HTTP management method.
– Secure HTTP—Indicates Secure HTTP sessions are assigned to the Access
Profile. Users with this Access Profile access the device using the Secure HTTP
management method.
– SNMP—Indicates SNMP sessions are assigned to the Access Profile. Users with
this Access Profile access the device using the SNMP management method.
• Interface—Specifies the interface to which the rule applies. The possible field values
are:
– Port—Indicates the interface is a port, and the specific port for which the Access
Profile is defined.
– LAG —Indicates the interface is a LAG, and the specific LAG for which the
Access Profile is defined.
– VLAN—Indicates the interface is a VLAN, and the specific VLAN for which the
Access Profile is defined.
• Source IP Address—Indicates the interface source IP address to which the packet is
matched.
• Network Mask—Indicates the interface network mask to which the packet is matched.
• Prefix Length—Indicates the prefix length to which the packet is matched.
• Action—Defines the Management Security Rule action. The possible field values are:
– Permit—Permits management access to the defined interface.
– Deny—Denies management access to the defined interface.
3 Define the Access Profile Name field.
4 Define the Rule Priority, Management Method, Interface, Source IP, Network Mask,
Prefix Length, and Action fields.