Waters Network Systems
User’s Manual
Page 31
GSM-2116 and GSM-2124
5.6 Management
Policy
Through the management security configuration, the manager can perform the setup to control the switch
and limit user to access the switch.
The following rules are provided for the management of the switch:
Rule 1: If no lists exists, all connections are accepted.
Accept
__________________________________________________
Rule 2: If “accept lists” exists, all connections will be denied except the connection inside the accepting
range.
Accept Deny
Accept
Deny
Accept
__________________________________________________
Rule 3: If “deny lists” exists, all connections will be accepted except the connection inside the denying
range.
Deny
Accept
Deny
Accept Deny
__________________________________________________
Rule 4: If both “accept and deny” lists exist, all connections will be denied except the connection inside
the accepting range.
Accept Deny
Deny
Deny
Accept
__________________________________________________
Rule 5: If both “accept and deny” lists exist, all connections will be denied except the connection inside
of accepting range and NOT inside the denying range at the same time.
Accept
Deny
Deny| Acc | Deny | Acc | Deny
__________________________________________________
Function name:
Management Security Configuration
Function description:
The switch provides a Management Security Configuration function. With this function, the manager
can easily control the mode that the is used to connect to the switch. According to the mode, users
can be classified into two types: Those who are able to connect to the switch (Accept) and those
who are unable to connect to the switch (Deny). Some restrictions also can be placed on the mode
used to connect to the switch. For example, VLAN VID is able to be accepted or denied by the
Accept