Configuring Device Security
Configuring Management Security
Page 26
Configuring Management Security
This section provides information for configuring device management security, device authentication methods,
users and passwords.
This section includes the following topics:
•
Defining Access Profiles
•
Defining Profile Rules
•
Defining Authentication Profiles
•
Mapping Authentication Profiles
Defining Access Profiles
Access profiles are profiles and rules for accessing the device. Access to management functions can be limited to
user groups. User groups are defined for interfaces according to IP addresses or IP subnets. Access profiles
contain management methods for accessing and managing the device. The device management methods
include:
•
All
•
Telnet
•
Secure Telnet (SSH)
•
HTTP
•
Secure HTTP (HTTPS)
Management access to different management methods may differ between user groups. For example, User
Group 1 can access the device module only via an HTTPS session, while User Group 2 can access the device
module via both HTTPS and Telnet sessions. The
Access Profile Page
contains the currently configured access
profiles and their activity status.
Assigning an access profile to an interface denies access via other interfaces. If an access profile is assigned to
any interface, the device can be accessed by all interfaces.
To define access profiles:
1.
Click
Mgmt. Security > Access Profile
. The
Access Profile Page
opens: