User manual
Table Of Contents
- NMS300 Network Management System Application
- Contents
- 1 Introduction
- 2 Get Started
- 3 Discover and Manage Resources
- Discovery concepts
- Use quick discovery to discover devices on your network
- Use a discovery profile to discover devices on your network
- View and manage the wired and wireless devices on your network
- View device information
- View wireless device information only
- Modify the name, location information, and contact information
- Remove device information
- Synchronize a network device
- Log in to a device
- Ping, perform a traceroute, or reboot a device
- Use the SNMP MIB browser
- View and export the Inventory table and Interface List table
- Manage device groups
- Search for the switch to which a host is connected
- 4 Monitor Devices and the Network
- Monitor the network
- Monitor the top 10 widgets for all devices
- Customize the top 10 page
- View the wireless summary and monitor the top 10 widgets for wireless devices
- View device details and interface details
- Monitor wireless clients and view client details
- Manage the configuration monitors
- Customize the optional network dashboard
- View and export audit logs
- View firmware version information
- View the NMS300 server information
- View application notifications
- 5 Manage Configurations and Firmware
- 6 Manage Alarms and Logs
- 7 Manage Maps and Topologies
- 8 Manage sFlow
- 9 Generate and View Reports
- 10 Manage Jobs
- 11 Manage Users and Security Profiles
- 12 Manage Global Settings and Backups
- 13 Manage Licenses
- 14 Register Devices
- A Technical Specifications
- B Device Details
- 1 Index
NMS300 Network Management System Application
Manage Users and Security Profiles User Manual262
3. Click the Sign In button.
The Network Summary page displays.
4. Select USERS > SECURITY PROFILES.
5. Click the Add button.
The Add Security profile pop-up window opens.
6. In the Profile Name field, enter a name.
7. In the Profile settings section of the pop-up window,
select the check boxes for the functions
that you want to include in the security profile.
8. Click the Submit button.
The security profile is saved and added to the User Profile table.