TP-Link TL-SL3428 Switch User Manual


 
22
23
Prex Length — Denes the number of bits that comprise the source IP address prex, or the network mask of the
source IP address.
Action —Denes the action attached to the access rule. The possible eld values are:
Permit — Permits access to the device.
Deny — Denies access to the device. This is the default.
3. Click . The access prole is saved and the device is updated.
5.1.1.2 Dening Prole Rules
Access profiles can contain up to 128 rules that determine which users can manage the switch module, and by which
methods. Users can also be blocked from accessing the device. Rules are composed of lters including:
Rule Priority
Interface
Management Method
IP Address
Prex Length
Forwarding Action
To dene prole rules:
1. Click System > Management Security > Authentication > Prole Rules. The Prole Rules Page opens:
Figure 26: Prole Rules Page
The Prole Rules Page contains the following elds:
Access Prole Name — Displays the access prole to
which the rule is attached.
Priority — Denes the rule priority. When the packet is
matched to a rule, user groups are either granted per-
mission or denied device management access. The
rule number is essential to matching packets to rules, as packets are matched on a rst-t basis.
Interface — Indicates the interface type to which the rule applies. The possible eld values are:
Port — Attaches the rule to the selected port.
LAG — Attaches the rule to the selected LAG.
VLAN — Attaches the rule to the selected VLAN.
Management Method — Denes the management method for which the rule is dened. Users with this access prole
can access the device using the management method selected. The possible eld values are:
All — Assigns all management methods to the rule.
Telnet — Assigns Telnet access to the rule. If selected, users accessing the device using Telnet meeting access prole
criteria are permitted or denied access to the device.
Secure Telnet (SSH) — Assigns SSH access to the rule. If selected, users accessing the device using Telnet meeting
access prole criteria are permitted or denied access to the device.
HTTP — Assigns HTTP access to the rule. If selected, users accessing the device using HTTP meeting access prole
criteria are permitted or denied access to the device.
Secure HTTP (HTTPS) — Assigns HTTPS access to the rule. If selected, users accessing the device using HTTPS
meeting access prole criteria are permitted or denied access to the device.
SNMP — Assigns SNMP access to the rule. If selected, users accessing the device using SNMP meeting access
prole criteria are permitted or denied access to the device.
Source IP Address — Denes the interface source IP address to which the rule applies.