User Manual

Table Of Contents
Manage Device Security
583
M6100, M5300, and M7100 Series Managed Switches
7. Select Security > Access > Access Control > Access Rule Configuration.
You can apply changes to the access rule only when the access profile is in a deactived
state.
Note: Make sure that the access profile is created before adding the rules.
8. From the Rule Type list, select to either Permit or Deny access when the rules selected are
matched.
9. The policy is restricted by the Service Type you select from the list.
Possible management methods are as follows:
HTTP
JAVA
Secure HTTP (SSL)
Secure Telnet (SSH)
SNMP
Telnet
TFTP
10. Enter the Source IP Address of the client originating the management traffic.
11. Enter the source IP address Mask of the client originating the management traffic.
12. Configure the Priority for the rule.
The rules are validated against the incoming management request in ascending order of
their priorities. If a rule matches, the action is performed and subsequent rules below that
are ignored. For example, if a source IP 10.10.10.10 is configured with priority 1 to
permit, and source IP 10.10.10.10 is configured with priority 2 to eeny, then access is
permitted if the profile is active, and the second rule is ignored.
13. Click the Add button.
The access rule is added.
14. To delete the selected access rule, click the Delete button.
You can delete an access rule only if the access profile is deactivated.
15. Click the Apply button.