User guide

24
25
Prex Length Denes the number of bits that comprise the source IP address prex, or the network mask of the
source IP address.
Action Denes the action attached to the rule. The possible eld values are:
Permit Permits access to the device.
Deny Denies access to the device. This is the default.
Remove Removes rules from the selected access proles. The possible eld values are:
Checked Removes the selected rule from the access prole.
Unchecked Maintains the rules attached to the access prole.
2. Click . The Add Prole Rule Page opens:
Figure 27: Add Prole Rule Page
3. Dene the elds.
4. Click . The prole rule is added to the access
prole, and the device is updated.
To modify a Prole Rule:
1. Click Security > Management Security >
Authentication > Access Prole. The Access Prole
Page opens.
2. Click . The Prole Rule Settings Page opens:
Figure 28: Prole Rule Settings Page
3. Modify the elds.
4. Click . The profile rule is modified, and the
device is updated.
5.1.1.3 Dening Authentication Proles
Authentication profiles allow network administrators to assign authentication methods for user authentication. User
authentication can be performed either locally or on an external server. User authentication occurs in the order the methods
are selected. If therst authentication method is not available, the next selected method is used. For example, if the selected
authentication methods are RADIUS and Local, and the RADIUS server is not available, then the user is authenticated
locally.
To dene Authentication proles:
1. Click System > Management Security > Authentication > Authentication Proles. The Authentication Proles Page
opens:
Figure 29: Authentication Proles Page
The Authentication Profiles Page provides the following
tables:
Login Authentication Proles
Enable Authentication Proles