User Manual

Table Of Contents
16-Port Gigabit (Hi-Power) PoE+ Ethernet Smart Managed Pro Switch with 2 SFP Ports
Manage Device Security User Manual276
If you do not know the IP address of the switch, see Access the switch on-network and
connected to the Internet on page 17 or Access the switch off-network and not
connected to the Internet on page 25.
The Device UI login page displays.
If you did not yet activate your warranty, the Register to activate your warranty page
displays. For more information, see
Register the switch on page 28.
4. Enter one of the following passwords:
Enter your device admin password.
If you previously managed the switch through the Insight app or Cloud portal, enter
the Insight network password for the last Insight network locat
ion.
For information about the credentials, see
Credentials for the device UI on page 26.
5. Click the Go
button.
The System Information page displays.
6. Select Security > Access
> Access Control > Access Rule Configuration.
7. From the Rule Type menu, select Permit or Deny to permit or deny access when the
selected rules are matched.
A Permit rule allows access from a device that matches the rule criteria. A Deny rule
blocks a device that matches the rule criteria.
8. From the Service T
ype menu, select the access method to which the rule is applied.
The policy is restricted by the selected access method. Possible access methods are
TFTP, HTTP, Secure HTTP (SSL), and
SNMP.
9. In the Source IP Address field, enter the source IP address from which the management
traffic originates.
10. In the Mask
field, specify the subnet mask from which the management traffic originates.
11. In the Priority
field, assign a priority to the rule.
The rules are validated against the incoming management request in ascending order of
their priorities. If
a rule matches, the action is performed and subsequent rules below that
rule are ignored. For example, if a source IP address 10.10.10.10 is configured with
priority 1 to permit, and the same source IP address 10.10.10.10 is also configured with
priority 2 to deny, then access is permitted if the profile is active, and the second rule is
ignored.
12. Click
the Add
button.
The access rule is added.