Manage Device Security
276
Insight Managed 28-Port Gigabit Ethernet Smart Cloud Switch with 2 SFP 1G & 2 SFP+ 10G Fiber Ports
9.
To refresh the page with the latest information about the switch, click the
Refresh
button.
The following table describes the nonconfigurable data that is displayed.
Configure Access Rule Settings
You can add security access rules. You can apply changes an the access rule only when
the access profile is in a deactivated state.
Note:
Make sure that you create the access profile before you add rules.
To configure access rules:
1.
Connect your computer to the same network as the switch.
You can use a WiFi or wired connection to connect your computer to the network, or
connect directly to a switch that is off-network using an Ethernet cable.
2.
Launch a web browser.
3.
In the address field of your web browser, enter the IP address of the switch.
If you do not know the IP address of the switch, see
The login window opens.
4.
Enter the switch’s password in the
password
field.
The default password is
password
. If you added the switch to a network on the Insight
app before and you did not yet change the password through the local browser interface,
enter your Insight network password.
The System Information page displays.
5.
Select
Security > Access > Access Control > Access Rule Configuration
.
Table 70. Access profile configuration profile summary
Field
Description
Rule Type
The action performed when the rules match.
Service Type
The selected service type. The policy is restricted by the selected service type
chosen. The possible methods are HTTP, and secure HTTP (SSL).
Source IP Address
Source IP address of the client originating the management traffic.
Mask
The subnet mask of the IP Address of the client originating the management traffic.
Priority
The priority of the rule. The rules are validated against the incoming management
request in the ascending order of their priorities. If a rule matches, action is
performed and subsequent rules are ignored. For example, if a source IP address
of 10.10.10.10 is configured with priority 1 to permit and source IP address
10.10.10.10 is configured with priority 2 to deny, access is permitted if the profile is
active, and the second rule is ignored.