User Manual

Table Of Contents
Managing Device Security
426
M6100 Web Management User Guide
Table 157.
Field Description
Rule Type The action performed when the rules are matched.
Service Type The service type chosen. The policy is restricted by the service type
chosen.
Source IP Address Source IP address of the client originating the management traffic.
Mask The subnet mask of the IP Address.
Priority The priority of the rule.
Access Profile Configuration Profile Summary
Access Rule Configuration
To display the Access Rule Configuration page, click Security Access > Access Control >
Access Rule Configuration. The following page is displayed.
Configure the Access Rule Configuration settings.
1. From the Rule T
ype list, select to either Permit or Deny access when the rules selected
are matched.
2. The policy is restricted by the Service T
ype you select from the list. Possible management
methods are:
HTTP
JA
VA
Secure HTTP (SSL)
Secure T
elnet (SSH)
SNMP
T
elnet
TFTP
3. Enter the Source IP
Address of the client originating the management traffic.
4. Enter the Source IP
Address Mask of the client originating the management traffic.
5. Configure the Priority to the rule.
The rules are validated against the incoming management
request in ascending order of their priorities. If a rule matches, the action is performed and