Profile Rules
Access profiles can contain up to 255 rules to determine who is permitted to manage and access the device, and the access methods that may be used.
Each rule in an access profile contains an action and criteria (one or more parameters) to match. Each rule has a priority; rules with the lowest priority are checked first. If the incoming packet matches a rule, the action associated with the rule is performed. If no matching rule is found within the active access profile, the packet is dropped.
For example, you can limit access to the device from all IP addresses except IP addresses that are allocated to the IT management center. In this way, the device can still be managed and has gained another layer of security.
To add profile rules to an access profile, complete the following steps:
Procedure
Step 1 | Click Security > Mgmt Access Method > Profile Rules. |
Step 2 | Select the Filter field, and an access profile. Click Go. The selected access profile appears in the Profile Rule Table. |
Step 3 | Click Add to add a rule. |
Step 4 | Enter the parameters.
|
Step 5 | Click Apply, and the rule is added to the access profile. |