44
C
HAPTER
3: A
CCESSING
THE
S
WITCH
The most common applications that use access profiles allow you to
remotely manage the switch across the network, for example:
■
SNMP read access
■
SNMP read and write access
■
Telnet
■
Web access
Creating an Access
Profile
Access profiles are created to specifically permit or deny users access to
an application. Access is restricted by assigning an access profile to the
service that is being used for remote access. First, create and configure
the access profile with the desired controls. Next, configure the
application to use the access profile that you have created. You must
configure the application to use the named access profile. Otherwise, no
restrictions are applied.
Table 11
lists access profile commands.
Table 11
Access Profile Configuration Commands
Command
Description
config access-profile <access_profile>
add ipaddress <ipaddress>
<subnet_mask>}
Adds an IP address to the access profile.
config access-profile <access_profile>
delete ipaddress <ipaddress>
<subnet_mask>
Deletes an IP address from the access profile.
config access-profile <access_profile>
mode [permit | deny]
Configures the access profile to be one of the
following:
■
permit
— Allows the addresses that
match the access profile description.
■
deny
— Denies the addresses that match
the access profile description.
The default setting is
permit
.
create access-profile <access_profile>
type ipaddress
Creates an access profile. Once the access
profile is created, one or more addresses can
be added to it, and the profile can be used to
control access to an application.
delete access-profile <access_profile>
Deletes an access profile.
show access-profile <access_profile>
Displays access-profile related information for
the switch.
Содержание 3C17705
Страница 1: ... http www 3com com SuperStack II Switch 9100 User Guide Part No DUA1770 5AAA01 Published January 2000 ...
Страница 10: ...GLOSSARY INDEX INDEX OF COMMANDS 3COM CORPORATION LIMITED WARRANTY EMC STATEMENTS ...
Страница 14: ...14 ABOUT THIS GUIDE ...
Страница 32: ...32 CHAPTER 2 INSTALLATION AND SETUP ...
Страница 62: ...62 CHAPTER 3 ACCESSING THE SWITCH ...
Страница 80: ...80 CHAPTER 4 VIRTUAL LANS VLANS ...
Страница 86: ...86 CHAPTER 5 FORWARDING DATABASE FDB ...
Страница 98: ...98 CHAPTER 6 SPANNING TREE PROTOCOL STP ...
Страница 110: ...110 CHAPTER 7 QUALITY OF SERVICE QOS ...
Страница 124: ...124 CHAPTER 8 STATUS MONITORING AND STATISTICS ...
Страница 130: ...130 CHAPTER 9 USING THE WEB INTERFACE ...
Страница 136: ...136 CHAPTER 10 SOFTWARE UPGRADE AND BOOT OPTIONS ...
Страница 156: ...156 APPENDIX C TROUBLESHOOTING ...
Страница 162: ......
Страница 176: ...176 INDEX ...
Страница 180: ...180 INDEX OF COMMANDS ...