Cisco Systems SG50028PK9NA Manual De Usuario

Descargar
Página de 638
Security
Management Access Method
Cisco Small Business 200, 300 and 500 Series Managed Switch Administration Guide (Internal Version) 
345
18
 
-
Days—Number of days that the key-identifier is valid.
-
Hours—Number of hours that the key-identifier is valid.
-
Minutes—Number of minutes that the key-identifier is valid.
-
Seconds—Number of seconds that the key-identifier is valid.
STEP  4
To always display sensitive data as plaintext (and not in encrypted form), click 
Display Sensitive Data as Plaintext.
STEP  5
Click Apply. The settings are written to the Running Configuration file.
Management Access Method
Access profiles determine how to authenticate and authorize users accessing the 
device through various access methods. Access Profiles can limit management 
access from specific sources.
Only users who pass both the active access profile and the management access 
authentication methods are given management access to the device.
There can only be a single access profile active on the device at one time.
Access profiles consist of one or more rules. The rules are executed in order of 
their priority within the access profile (top to bottom).
Rules are composed of filters that include the following elements:
Access Methods—Methods for accessing and managing the device:
-
Telnet
-
Secure Telnet (SSH)
-
Hypertext Transfer Protocol (HTTP)
-
Secure HTTP (HTTPS)
-
Simple Network Management Protocol (SNMP)
-
All of the above
Action—Permit or deny access to an interface or source address.
Interface—Which ports, LAGs, or VLANs are permitted to access or are 
denied access to the web-based configuration utility.