TP-Link TL-SG3109 Switch User Manual


 
22
23
Figure 24: Access Prole Page
The Access Prole Page contains the following elds:
Access Profile Name — Defines the access profile
name. The access prole name can contain up to 32
characters.
Active Prole — Denes the access prole currently
active.
Remove — Removes the selected access prole. The possible eld values are:
Checked — Removes the selected access prole. Access Proles cannot be removed when Active.
Unchecked — Maintains the access proles.
Disable Active Prole — Disables the active access prole. The possible eld values are:
Checked — Disables the active access proles.
Unchecked — Indicates the access prole is currently active. This is the default value.
2. Click . The Add Access Prole Page opens:
Figure 25: Add Access Prole Page
In addition to the elds in the Access Prole Page, the Add
Access Prole Page contains the following elds:
Access Prole Name — Denes a new access prole
name.
Rule Priority — Defines the rule priority. When the
packet is matched to a rule, user groups are either
granted permission or denied device management
access. The rule number is essential to matching
packets to rules, as packets are matched on a rst-t basis. The rule priorities are assigned in the Prole Rules Page.
Management Method — Denes the management method for which the rule is dened. Users with this access prole
can access the device using the management method selected. The possible eld values are:
All — Assigns all management methods to the rule.
Telnet — Assigns Telnet access to the rule. If selected, users accessing the device using Telnet meeting access prole
criteria are permitted or denied access to the device.
Secure Telnet (SSH) — Assigns SSH access to the rule. If selected, users accessing the device using Telnet meeting
access prole criteria are permitted or denied access to the device.
HTTP — Assigns HTTP access to the rule. If selected, users accessing the device using HTTP meeting access prole
criteria are permitted or denied access to the device.
Secure HTTP (HTTPS) — Assigns HTTPS access to the rule. If selected, users accessing the device using HTTPS
meeting access prole criteria are permitted or denied access to the device.
SNMP — Assigns SNMP access to the rule. If selected, users accessing the device using SNMP meeting access
prole criteria are permitted or denied access to the device.
Interface — Denes the interface on which the access prole is dened. The possible eld values are:
Port — Species the port on which the access prole is dened.
LAG — Species the LAG on which the access prole is dened.
VLAN — Species the VLAN on which the access prole is dened.
Source IP Address — Denes the interface source IP address to which the access prole applies. The Source IP
Address eld is valid for a subnetwork.
Network Mask — Denes the network mask of the source IP address.