GS700TR Smart Switch Software Administration Manual
Managing Device Security 6-21
v1.0, May, 2008
2. Click Refresh to update the page with the most current information.
3. Click Cancel to cancel the configuration on the screen and reset the data on the screen to the
latest value of the switch.
4. If you change any of the settings on the page, click Apply to send the updated configuration to
the switch. Configuration changes take effect immediately.
Access Rule Configuration
Use the Access Rule Configuration page to configure the rules about what systems can access the
GS700TR Web interface and what protocols are allowed.
To access the Access Rule Configuration page:
1. Click Security > Access, and then click the Access Control > Access Rule Configuration
link.
Source IP Address Shows the IP Address of the client that may or may not originate
management traffic.
Mask Shows the subnet mask associated with the IP address.
Priority Shows the priority of the rule. The rules are validated against the
incoming management request in the ascending order of their priorities.
If a rule matches, action is performed and subsequent rules below are
ignored.
Figure 6-13
Table 6-15. Profile Summary Fields (continued)
Field Description