![Cisco 350XG series Скачать руководство пользователя страница 417](http://html.mh-extra.com/html/cisco/350xg-series/350xg-series_administration-manual_67491417.webp)
Security
Management Access Method
Cisco 350XG & 550XG Series 10G Stackable Managed Switches
403
19
-
User Defined
—Life of the key-chain is limited. If this option, is selected
enter values in the following fields.
•
Start Date
—Enter the earliest date that the key-identifier is valid.
•
Start Time
—Enter the earliest time that the key-identifier is valid on the Start
Date.
•
End Time
—Specifies the last date that the key-identifier is valid. Select one
of the following options.
-
Infinite
—No limit to the life of the key-identifier.
-
Duration
—Life of the key-identifier is limited. If this option, is selected
enter values in the following fields.
•
Duration
—Length of time that the key identifier is valid. Enter the following
fields:
-
Days
—Number of days that the key-identifier is valid.
-
Hours
—Number of hours that the key-identifier is valid.
-
Minutes
—Number of minutes that the key-identifier is valid.
-
Seconds
—Number of seconds that the key-identifier is valid.
STEP 4
Click Apply. The settings are written to the Running Configuration file.
STEP 5
To always display sensitive data as plaintext (and not in encrypted form), click
Display Sensitive Data as Plaintext.
Management Access Method
This section describes access rules for various management methods.
It covers the following topics:
•
•
Access profiles determine how to authenticate and authorize users accessing the
device through various access methods. Access Profiles can limit management
access from specific sources.