Allied Telesis AT-8000S Manuel D’Utilisation
![Allied Telesis](https://files.manualsbrain.com/attachments/462516a581cd41e34c63b2661e9146f39cdfc3ab/common/fit/150/50/5a51de7070975571f08ba1bcbc272fbf5b60d69f41f53dd15198063c6333/brand_logo.jpeg)
Configuring Device Security
Configuring Management Security
Page 29
–
Checked — The access profile is currently active. Access Profiles cannot be deleted when active.
–
Unchecked — Disables the active access profile.
2.
Click Add. The Add Access Profile Page opens:
Figure 12: Add Access Profile Page
The Add Access Profile Page contains the following fields:
•
Access Profile Name — Defines the name of a new access profile.
•
Rule Priority — Defines the rule priority. When the packet is matched to a rule, user groups are either
granted permission or denied device management access. The rule number is essential to matching packets
to rules, as packets are matched on a first-fit basis. The rule priorities are assigned in the Profile Rules Page.
to rules, as packets are matched on a first-fit basis. The rule priorities are assigned in the Profile Rules Page.
•
Management Method — Defines the management method for which the rule is defined. Users with this
access profile can access the device using the management method selected. The possible field values are:
–
All — Assigns all management methods to the rule.
–
Telnet — Assigns Telnet access to the rule. If selected, users accessing the device using Telnet meeting
access profile criteria are permitted or denied access to the device.
–
Secure Telnet (SSH) — Assigns SSH access to the rule. If selected, users accessing the device using
Telnet meeting access profile criteria are permitted or denied access to the device.
–
HTTP — Assigns HTTP access to the rule. If selected, users accessing the device using HTTP meeting
access profile criteria are permitted or denied access to the device.
–
Secure HTTP (HTTPS) — Assigns HTTPS access to the rule. If selected, users accessing the device
using HTTPS meeting access profile criteria are permitted or denied access to the device.
–
SNMP — Assigns SNMP access to the rule. If selected, users accessing the device using SNMP
meeting access profile criteria are permitted or denied access to the device.
•
Interface — Defines the interface on which the access profile is defined. The possible field values are:
–
Port — Specifies the port on which the access profile is defined.
–
LAG — Specifies the LAG on which the access profile is defined.
–
VLAN — Specifies the VLAN on which the access profile is defined.
•
Source IP Address — Defines the interface source IP address to which the access profile applies.
The Source IP Address field is valid for a subnetwork.