Dell 3548 Switch User Manual


 
170 Configuring System Information
Managing Management Security
The Management Security page provides access to security pages that contain fields for setting security
parameters for device management methods, user authentication databases and servers. To open the
Management Security page, click SystemManagement Security in the tree view.
This section contians the following topics:
"Defining Access Profiles" on page 170
"Defining Authentication Profiles" on page 177
"Selecting Authentication Profiles" on page 181
"Managing Passwords" on page 184
"Displaying Active Users" on page 187
"Defining the Local User Databases" on page 189
"Defining Line Passwords" on page 192
"Defining Enable Passwords" on page 194
"Defining TACACS+ Settings" on page 196
"Configuring RADIUS Settings" on page 200
Defining Access Profiles
The Access Profiles page contains fields for defining profiles and rules for accessing the device. Access to
management functions can be limited to user groups, which are defined by ingress interfaces and source
IP address or source IP subnets.
Management access can be separately defined for each type of management access method, including
Web (HTTP), Secure Web (HTTPS), Telnet, and Secure Telnet.
Access to different management methods may differ between user groups. For example, User Group 1
can access the device only via an HTTPS session, while User Group 2 can access the device via both
HTTPS and Telnet sessions.
Management Access Lists contain up to 256 rules that determine which users can manage the device,
and by which methods. Users can also be blocked from accessing the device.
The Access Profiles page contains fields for configuring Management Lists and applying them to
specific interfaces.