
GS716Tv2 and GS724Tv3 Software Administration Manual
Managing Device Security
5-21
v1.0, July 2009
2.
Click
Refresh
to update the page with the most current information.
3.
Click
Cancel
to cancel the configuration on the screen and reset the data on the screen to the
latest value of the switch.
4.
If you change any of the settings on the page, click
Apply
to send the updated configuration to
the switch. Configuration changes take effect immediately.
Access Rule Configuration
Use the Access Rule Configuration page to configure the rules about what systems can access the
GS716T and GS724T Web interface and what protocols are allowed.
To access the Access Rule Configuration page:
1.
Click
Security
Access
, and then click the
Access Control
Access Rule Configuration
link.
Source IP Address
Shows the IP Address of the client that may or may not originate
management traffic.
Mask
Shows the subnet mask associated with the IP address.
Priority
Shows the priority of the rule. The rules are validated against the
incoming management request in the ascending order of their priorities.
If a rule matches, action is performed and subsequent rules below are
ignored.
Figure
5-13
Table
5-15. Profile Summary Fields (continued)
Field
Description