Cisco 350 Series Administration Manual page 484

Managed switches
Hide thumbs Also See for 350 Series:
Table of Contents

Advertisement

Security
Management Access Method
STEP 7
STEP 1
STEP 2
Cisco 350, 350X and 550X Series Managed Switches, Firmware Release 2.4, ver 0.4
Interface—Enter the interface number if User Defined was selected.
Applies to Source IP Address—Select the type of source IP address to which the
access profile applies. The Source IP Address field is valid for a subnetwork. Select one
of the following values:
-
All—Applies to all types of IP addresses.
-
User Defined—Applies to only those types of IP addresses defined in the fields.
IP Version—Enter the version of the source IP address: Version 6 or Version 4.
IP Address—Enter the source IP address.
Mask—Select the format for the subnet mask for the source IP address, and enter a
value in one of the fields:
-
Network Mask—Select the subnet to which the source IP address belongs and enter
the subnet mask in dotted decimal format.
-
Prefix Length—Select the Prefix Length and enter the number of bits that comprise
the source IP address prefix.
Click Apply. The access profile is written to the Running Configuration file. You can now
select this access profile as the active access profile.
Profile Rules
Access profiles can contain up to 128 rules to determine who is permitted to manage and
access the device, and the access methods that may be used.
Each rule in an access profile contains an action and criteria (one or more parameters) to
match. Each rule has a priority; rules with the lowest priority are checked first. If the incoming
packet matches a rule, the action associated with the rule is performed. If no matching rule is
found within the active access profile, the packet is dropped.
For example, you can limit access to the device from all IP addresses except IP addresses that
are allocated to the IT management center. In this way, the device can still be managed and has
gained another layer of security.
To add profile rules to an access profile:
Click Security > Mgmt Access Method > Profile Rules.
Select the Filter field, and an access profile. Click Go.
17
341

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents