20
21
Section 5. Conguring Device Security
This section describes pages that contain fields for setting security parameters for ports, device management methods,
users, and server security for the TP-Link device.
This section contains the following topics:
Conguring Management Security
Conguring Network Security
5.1 Conguring Management Security
This section provides information for conguring device management security.
This section includes the following topics:
Conguring Authentication Methods
Conguring Passwords
5.1.1 Conguring Authentication Methods
This section provides information for conguring device authentication methods.
This section includes the following topics:
Dening Access Proles
Dening Prole Rules
Dening Authentication Proles
Mapping Authentication Proles
Dening TACACS+ Host Settings
Dening RADIUS Server Settings
5.1.1.1 Dening Access Proles
Access proles are proles and rules for accessing the device. Access to management functions can be limited to user
groups. User groups are dened for interfaces according to IP addresses or IP subnets. Access proles contain management
methods for accessing and managing the device. The device management methods include:
All
Telnet
Secure Telnet (SSH)
HTTP
Management access to different management methods may differ between user groups. For example, User Group 1 can
access the switch module only via an HTTPS session, while User Group 2 can access the switch module via both HTTPS
and Telnet sessions. The Access Prole Page contains the currently congured access proles and their activity status.
Assigning an access prole to an interface denies access via other interfaces. If an access prole is assigned to any interface,
the device can be accessed by all interfaces.
To congure access proles:
1. Click System > Management Security > Authentication > Access Proles. The Access Prole Page opens: