Справочник Пользователя для TP-LINK TL-SG2008

Скачать
Страница из 153
 
20 
¾
 
Access Control Config 
Control Mode: 
Select the control mode for users to log on to the Web 
management page. 
z
 
Disable:Disable the access control function. 
z
 
IP-based: Select this option to limit the IP-range of the users 
for login. 
z
 
MAC-based: Select this option to limit the MAC Address of the 
users for login. 
z
 
Port-based: Select this option to limit the ports for login. 
IP Address & Mask 
These fields can be available for configuration only when IP-based 
mode is selected. Only the users within the IP-range you set here 
are allowed for login. 
MAC Address:   
The field can be available for configuration only when MAC-based 
mode is selected. Only the user with this MAC Address you set 
here is allowed for login. 
Port: 
The field can be available for configuration only when Port-based 
mode is selected. Only the users connected to these ports you set 
here are allowed for login. 
¾
 
Session Config 
Session Timeout: 
If you do nothing with the Web management page within the 
timeout time, the system will log out automatically. If you want to 
reconfigure, please login again. 
¾
 
Access User Number 
Number Control: 
Select Enable/Disable the Number Control function. 
Admin Number: 
Enter the maximum number of the users logging on to the Web 
management page as Admin. 
Guest Number: 
Enter the maximum number of the users logging on to the Web 
management page as Guest. 
4.4.2 SSL Config 
SSL (Secure Sockets Layer), a security protocol, is to provide a secure connection for the 
application layer protocol (e.g. HTTP) communication based on TCP. SSL is widely used to secure 
the data transmission between the Web browser and servers. It is mainly applied through 
ecommerce and online banking. 
SSL mainly provides the following services: 
1.  Authenticate the users and the servers based on the certificates to ensure the data are 
transmitted to the correct users and servers; 
2.  Encrypt the data transmission to prevent the data being intercepted; 
3.  Maintain the integrality of the data to prevent the data being altered in the transmission. 
Adopting asymmetrical encryption technology, SSL uses key pair to encrypt/decrypt information. A 
key pair refers to a public key (contained in the certificate) and its corresponding private key. By