Table 4-7. Management Security Configuration settings.
Parameter Description
Name
A name is composed of any letter (A–Z, a–z) and digit (0–9) with a
maximum of 8 characters.
VID
VID supports two buttons for managed valid VLAN VID: Any and
Custom. The default is the
Any
button. When you click on the
Custom
button, you can type in the VID number. The valid VID range is 1–4094.
IP Range
The switch supports two options for the managed valid IP Range: Any
and Custom. The default is the
Any
button. When you click on the
Custom
button, you can type in an effective IP range. The valid range
is 0.0.0.0–255.255.255.255.
Incoming Port
The switch supports options for managed valid Port Range: Any and
Custom. The default is the
Any
button. When you click on the
Custom
button, you can check the box(es) next to the ports that you would like
to be restricted in the management security configuration.
Access Type
The switch supports two options for managed valid Access Type: Any
and Custom. The default is the
Any
button. When you click on the
Custom
button, you can check the box next to the option you want to
use to access and manage the switch. The three options include HTTP,
Telnet, and SNMP.
Action
The switch supports two options for managed valid Action Type: Deny
and Accept. The default is the
Deny
button. When you choose Deny,
you can’t manage the switch. If you click on the
Accept
button, you can
manage the switch.
Edit/Create
Click on this button to create a new management security entry, or to
modify an existing entry.
Delete
Click on this button to remove the selected management security
configuration entry from the management security table.
4.2.6 V
IRTUAL
S
TACK
Virtual Stack Management (VSM) is the group management function. To get to this option, click on
Virtual
Stack
in the System menu. Through the proper configuration of this function, switches in the same LAN will
be grouped automatically. Among these switches, one switch will be a master machine, and the others in this
group will become the slave devices.
VSM offers a simple centralized management function. You don’t have to remember all devices’ addresses,
since the administrator can manage the network with knowing only the Master machine’s address. Instead of
CHAPTER 4: Web-Based Management
39