TP-Link TL-SG3109 Switch User Manual


 
20
21
Section 5. Conguring Device Security
This section describes pages that contain fields for setting security parameters for ports, device management methods,
users, and server security for the TP-Link device.
This section contains the following topics:
Conguring Management Security
Conguring Network Security
5.1 Conguring Management Security
This section provides information for conguring device management security.
This section includes the following topics:
Conguring Authentication Methods
Conguring Passwords
5.1.1 Conguring Authentication Methods
This section provides information for conguring device authentication methods.
This section includes the following topics:
Dening Access Proles
Dening Prole Rules
Dening Authentication Proles
Mapping Authentication Proles
Dening TACACS+ Host Settings
Dening RADIUS Server Settings
5.1.1.1 Dening Access Proles
Access proles are proles and rules for accessing the device. Access to management functions can be limited to user
groups. User groups are dened for interfaces according to IP addresses or IP subnets. Access proles contain management
methods for accessing and managing the device. The device management methods include:
All
Telnet
Secure Telnet (SSH)
HTTP
Management access to different management methods may differ between user groups. For example, User Group 1 can
access the switch module only via an HTTPS session, while User Group 2 can access the switch module via both HTTPS
and Telnet sessions. The Access Prole Page contains the currently congured access proles and their activity status.
Assigning an access prole to an interface denies access via other interfaces. If an access prole is assigned to any interface,
the device can be accessed by all interfaces.
To congure access proles:
1. Click System > Management Security > Authentication > Access Proles. The Access Prole Page opens: