75
Table of Contents
Linksys
The selected access profile appears in the Profile Rule Table
STEP 3 Click Add to add a rule
STEP 4 Enter the parameters
•
Access Profile Name—Select an access profile
•
Rule Priority—Enter the rule priority When the packet is matched to
a rule, user groups are either granted or denied access to the device
The rule priority is essential to matching packets to rules, as packets are
matched on a first-fit basis
•
Management Access Method—Select the management method for
which the rule is defined The options are:
•
All—Assigns all management methods to the rule
•
Telnet—Users requesting access to the device that meets the Telnet
access profile criteria are permitted or denied access
•
HTTP—Assigns HTTP access to the rule Users requesting access to
the device that meets the HTTP access profile criteria, are permitted
or denied
•
Secure HTTP (HTTPS)—Users requesting access to the device that
meets the HTTPS access profile criteria, are permitted or denied
•
SNMP—Users requesting access to the device that meets the SNMP
access profile criteria are permitted or denied
•
Access Control—Select Permit to permit the users that attempt to access
the device by using the configured access method from the interface and
IP source defined in this rule Or select Deny to deny access
•
Interface—Select the interface attached to the rule The options are:
•
All—Applies to all ports, VLANs, and LAGs
•
Port—Select the port attached to the rule
•
LAG—Select the LAG attached to the rule
•
VLAN—Select the VLAN attached to the rule 264
•
Source IP Address—Select the type of source IP address to which the
418 access profile applies The Source IP Address field is valid for a
subnetwork Select one of the following values:
•
All—Applies to all types of IP addresses
•
User Defined—Applies to only those types of IP addresses defined in
the fields
•
IP Version—Select the supported IP version of the source address: IPv6
or IPv4
•
IP Address—Enter the source IP address
•
IP Subnet Mask—Select the format for the subnet mask for the source IP
address, and enter a value in one of the field:
•
Network Mask—Select the subnet to which the source IP address
belongs and enter the subnet mask in dotted decimal format
•
Prefix Length—Select the Prefix Length and enter the number of bits
that comprise the source IP address prefix
STEP 5 Click Apply, and the rule is added to the access profile
RADIUS
Remote Authorization Dial-In User Service (RADIUS) servers provide a
centralized 802 1X network access control The device is a RADIUS client that
can use a RADIUS server to provide centralized security
An organization can establish a RADIUS server to provide centralized 802 1X
network access control for all of its devices In this way, authentication
and authorization can be handled on a single server for all devices in the
organization
The device can act as a RADIUS client that uses the RADIUS server for the
following services:
•
Authentication—Provides authentication of regular and 802 1X users
logging onto the device with usernames and user-defined passwords
•
Authorization—Performed at login After the authentication session
is completed, an authorization session starts using the authenticated
username The RADIUS server then checks user privileges
•
Accounting—Enable accounting of login sessions using the RADIUS
server This enables a system administrator to generate accounting
reports from the RADIUS server
Accounting Using a RADIUS Server
The user can enable accounting of login sessions using a RADIUS server
Содержание Smart Switch LGS3XX
Страница 1: ...Smart Switch LGS3XX User Guide ...