Chapter 7: Managing Device Security | 209
GS752TXS Smart Switch Software Administration Manual
Access Rule Configuration
Use Access Rule Configuration page to add security access rules.
To access the Access Rule Configuration page, click the Security tab, then click Access, and
then click the Access Control Access Rule Configuration link.
To configure Access rules:
1. Select the following from the Profile Summary:
• Rule Type: Choose the action to be performed when the rules selected are matched. Use
the drop-down box and choose “Permit” or “Deny” access.
• Service Type: Select from the drop-down box. The policy is restricted by the
management chosen from the drop-down menu. Possible methods include “HTTP”,
“Secure HTTP (SSL)”, and “SNMP”.
• Source IP Address: Enter Source IP Address of the client originating the management
traffic. Fill in the “Source IP address” in the text box.
• Mask: Enter Source IP Address Mask of the client originating the management traffic. Fill
in the “Mask” details in the text box provided.
• Priority: Configure priority to the rule. The rules are validated against the incoming
management request in the ascending order of their priorities. If a rule matches, action is
performed and subsequent rules below are ignored. For example, if a Source IP
10.10.10.10 is configured with priority 1 to permit, and Source IP 10.10.10.10 is
configured with priority 2 to Deny, then access is permitted if the profile is active, and the
second rule is ignored.
2. To add a new rule, click Add. Make sure the access profile is created before adding the
rules.
3. Click Refresh to update the information on the screen.
4. Click Apply to start the certification configuration.
5. Click Cancel to cancel the configuration on the screen and reset the data on the screen to
the latest value of the switch.
Comments to this Manuals