11.07.2015 Views

Detaljplan för Sundsvall Logistikpark, WSP

Detaljplan för Sundsvall Logistikpark, WSP

Detaljplan för Sundsvall Logistikpark, WSP

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Figure 24: Access Profile PageThe Access Profile Page contains the following fields:‣ Access Profile Name — Defines the access profilename. The access profile name can contain up to 32characters.‣ Active Profile — Defines the access profile currentlyactive.‣ Remove — Removes the selected access profile. The possible field values are:– Checked — Removes the selected access profile. Access Profiles cannot be removed when Active.– Unchecked — Maintains the access profiles.‣ Disable Active Profile — Disables the active access profile. The possible field values are:– Checked — Disables the active access profiles.– Unchecked — Indicates the access profile is currently active. This is the default value.2. Click . The Add Access Profile Page opens:Figure 25: Add Access Profile PageIn addition to the fields in the Access Profile Page, the AddAccess Profile Page contains the following fields:‣ Access Profile Name — Defines a new access profilename.‣ Rule Priority — Defines the rule priority. When thepacket is matched to a rule, user groups are eithergranted permission or denied device managementaccess. The rule number is essential to matchingpackets to rules, as packets are matched on a first-fit basis. The rule priorities are assigned in the Profile Rules Page.‣ Management Method — Defines the management method for which the rule is defined. Users with this access profilecan access the device using the management method selected. The possible field values are:– All — Assigns all management methods to the rule.– Telnet — Assigns Telnet access to the rule. If selected, users accessing the device using Telnet meeting access profilecriteria are permitted or denied access to the device.– Secure Telnet (SSH) — Assigns SSH access to the rule. If selected, users accessing the device using Telnet meetingaccess profile criteria are permitted or denied access to the device.– HTTP — Assigns HTTP access to the rule. If selected, users accessing the device using HTTP meeting access profilecriteria are permitted or denied access to the device.– Secure HTTP (HTTPS) — Assigns HTTPS access to the rule. If selected, users accessing the device using HTTPSmeeting access profile criteria are permitted or denied access to the device.– SNMP — Assigns SNMP access to the rule. If selected, users accessing the device using SNMP meeting accessprofile criteria are permitted or denied access to the device.‣ Interface — Defines the interface on which the access profile is defined. The possible field values are:– Port — Specifies the port on which the access profile is defined.– LAG — Specifies the LAG on which the access profile is defined.– VLAN — Specifies the VLAN on which the access profile is defined.– Source IP Address — Defines the interface source IP address to which the access profile applies. The Source IPAddress field is valid for a subnetwork.– Network Mask — Defines the network mask of the source IP address.2 2

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!