TP-Link TL-SG3109 Switch User Manual


 
24
25
Prex Length — Denes the number of bits that comprise the source IP address prex, or the network mask of the
source IP address.
Action — Denes the action attached to the rule. The possible eld values are:
Permit — Permits access to the device.
Deny — Denies access to the device. This is the default.
Remove — Removes rules from the selected access proles. The possible eld values are:
Checked — Removes the selected rule from the access prole.
Unchecked — Maintains the rules attached to the access prole.
2. Click . The Add Prole Rule Page opens:
Figure 27: Add Prole Rule Page
3. Dene the elds.
4. Click . The prole rule is added to the access
prole, and the device is updated.
To modify a Prole Rule:
1. Click Security > Management Security >
Authentication > Access Prole. The Access Prole
Page opens.
2. Click . The Prole Rule Settings Page opens:
Figure 28: Prole Rule Settings Page
3. Modify the elds.
4. Click . The profile rule is modified, and the
device is updated.
5.1.1.3 Dening Authentication Proles
Authentication profiles allow network administrators to assign authentication methods for user authentication. User
authentication can be performed either locally or on an external server. User authentication occurs in the order the methods
are selected. If the rst authentication method is not available, the next selected method is used. For example, if the selected
authentication methods are RADIUS and Local, and the RADIUS server is not available, then the user is authenticated
locally.
To dene Authentication proles:
1. Click System > Management Security > Authentication > Authentication Proles. The Authentication Proles Page
opens:
Figure 29: Authentication Proles Page
The Authentication Profiles Page provides the following
tables:
Login Authentication Proles
Enable Authentication Proles