3 defining authentication profiles – TP-Link TL-SL3452 User Manual

Page 31

Advertising
background image



Prefix Length — Defines the number of bits that comprise the source IP address prefix, or the network mask of the
source IP address.
Action — Defines the action attached to the rule. The possible field values are:

Permit — Permits access to the device.
Deny — Denies access to the device. This is the default.

Remove — Removes rules from the selected access profiles. The possible field values are:

Checked — Removes the selected rule from the access profile.
Unchecked — Maintains the rules attached to the access profile.

2. Click

. The Add Profile Rule Page opens:

Figure 27: Add Profile Rule Page

3. Define the fields.

4. Click

. The profile rule is added to the access

profile, and the device is updated.

To modify a Profile Rule:
1. Click

Security > Management Security >

Authentication > Access Profile. The Access Profile
Page
opens.

2. Click

. The Profile Rule Settings Page opens:

Figure 28: Profile Rule Settings Page

3. Modify the fields.

4. Click

. The profile rule is modified, and the

device is updated.

5.1.1.3 Defining Authentication Profiles

Authentication profiles allow network administrators to assign authentication methods for user authentication. User
authentication can be performed either locally or on an external server. User authentication occurs in the order the methods
are selected. If the first authentication method is not available, the next selected method is used. For example, if the selected
authentication methods are RADIUS and Local, and the RADIUS server is not available, then the user is authenticated
locally.

To define Authentication profiles:
1. Click

System > Management Security > Authentication > Authentication Profiles. The Authentication Profiles Page

opens:

Figure 29: Authentication Profiles Page

The Authentication Profiles Page provides the following
tables:

Login Authentication Profiles
Enable Authentication Profiles


Advertising