Tp-Link TL-SL3452 [28/120] Configuring management security

Tp-Link TL-SL3452 [28/120] Configuring management security
20
21
Section 5. Conguring Device Security
This section describes pages that contain fields for setting security parameters for ports, device management methods,
users, and server security for the TP-Link device.
This section contains the following topics:
Conguring Management Security
Conguring Network Security
5.1 Conguring Management Security
This section provides information for conguring device management security.
This section includes the following topics:
Conguring Authentication Methods
Conguring Passwords
5.1.1 Conguring Authentication Methods
This section provides information for conguring device authentication methods.
This section includes the following topics:
Dening Access Proles
Dening Prole Rules
Dening Authentication Proles
Mapping Authentication Proles
Dening TACACS+ Host Settings
Dening RADIUS Server Settings
5.1.1.1 Dening Access Proles
Access proles are proles and rules for accessing the device. Access to management functions can be limited to user
groups. User groups are dened for interfaces according to IP addresses or IP subnets. Access proles contain management
methods for accessing and managing the device. The device management methods include:
All
Telnet
Secure Telnet (SSH)
HTTP
Management access to different management methods may differ between user groups. For example, User Group 1 can
access the switch module only via an HTTPS session, while User Group 2 can access the switch module via both HTTPS
and Telnet sessions. The Access Prole Page contains the currently congured access proles and their activity status.
Assigning an access prole to an interface denies access via other interfaces. If an access prole is assigned to any interface,
the device can be accessed by all interfaces.
To congure access proles:
1. Click System > Management Security > Authentication > Access Proles. The Access Prole Page opens:

Содержание

Скачать