24
25
Prex Length — Denes the number of bits that comprise the source IP address prex, or the network mask of the
source IP address.
Action — Denes the action attached to the rule. The possible eld values are:
– Permit — Permits access to the device.
– Deny — Denies access to the device. This is the default.
Remove — Removes rules from the selected access proles. The possible eld values are:
– Checked — Removes the selected rule from the access prole.
– Unchecked — Maintains the rules attached to the access prole.
2. Click . The Add Prole Rule Page opens:
Figure 27: Add Prole Rule Page
3. Dene the elds.
4. Click . The prole rule is added to the access
prole, and the device is updated.
To modify a Prole Rule:
1. Click Security > Management Security >
Authentication > Access Prole. The Access Prole
Page opens.
2. Click . The Prole Rule Settings Page opens:
Figure 28: Prole Rule Settings Page
3. Modify the elds.
4. Click . The profile rule is modified, and the
device is updated.
5.1.1.3 Dening Authentication Proles
Authentication profiles allow network administrators to assign authentication methods for user authentication. User
authentication can be performed either locally or on an external server. User authentication occurs in the order the methods
are selected. If the rst authentication method is not available, the next selected method is used. For example, if the selected
authentication methods are RADIUS and Local, and the RADIUS server is not available, then the user is authenticated
locally.
To dene Authentication proles:
1. Click System > Management Security > Authentication > Authentication Proles. The Authentication Proles Page
opens:
Figure 29: Authentication Proles Page
The Authentication Profiles Page provides the following
tables:
Login Authentication Proles
Enable Authentication Proles