Chapter 5. configuring device security, Configuring management security, Defining access profiles – Allied Telesis AT-S95 WEB User Manual

Page 43: Chapter 5.configuring device security, 5, section title“configuring device security

Advertising
background image

Configuring Device Security

Configuring Management Security

Page 43

Chapter 5. Configuring Device Security

This section describes setting security parameters for ports, device management methods, users, and servers.
This section contains the following topics:

Configuring Management Security

Configuring Server Based Authentication

Configuring Network Security

Defining Access Control

Configuring Management Security

This section provides information for configuring device management security, device authentication methods,
users and passwords.

This section includes the following topics:

Defining Access Profiles

Defining Profile Rules

Defining Authentication Profiles

Mapping Authentication Profiles

Defining Access Profiles

Access profiles are profiles and rules for accessing the device. Access to management functions can be limited to
user groups. User groups are defined for interfaces according to IP addresses or IP subnets. Access profiles
contain management methods for accessing and managing the device. The device management methods
include:

All

Telnet

Secure Telnet (SSH)

HTTP

Secure HTTP (HTTPS)

Management access to different management methods may differ between user groups. For example, User
Group 1 can access the device module only via an HTTPS session, while User Group 2 can access the device
module via both HTTPS and Telnet sessions. The Access Profile Page contains the currently configured access
profiles and their activity status.

Assigning an access profile to an interface denies access via other interfaces. If an access profile is assigned to
any interface, the device can be accessed by all interfaces.

Advertising