![](https://pdfstore-manualsonline.prod.a.ki/pdfasset/2/2f/22fdba8d-157d-488d-b0ae-1e2d73284d42/22fdba8d-157d-488d-b0ae-1e2d73284d42-bg54.png)
Configuring Device Security
Configuring Management Security
Page 83
– Telnet — Assigns Telnet access to the rule. If selected, users accessing the device using Telnet meeting
access profile criteria are permitted or denied access to the device.
– Secure Telnet (SSH) — Assigns SSH access to the rule. If selected, users accessing the device using
Telnet meeting access profile criteria are permitted or denied access to the device.
– HTTP — Assigns HTTP access to the rule. If selected, users accessing the device using HTTP meeting
access profile criteria are permitted or denied access to the device.
– Secure HTTP (HTTPS) — Assigns HTTPS access to the rule. If selected, users accessing the device
using HTTPS meeting access profile criteria are permitted or denied access to the device.
– SNMP — Assigns SNMP access to the rule. If selected, users accessing the device using SNMP
meeting access profile criteria are permitted or denied access to the device.
• Source IP Address — Defines the interface source IP address to which the rule applies.
• Prefix Length — Defines the number of bits that comprise the source IP address prefix, or the network mask
of the source IP address.
• Action —Defines the action attached to the rule. The possible field values are:
– Permit — Permits access to the device.
– Deny — Denies access to the device. This is the default.
• Remove — Removes rules from the selected access profiles. The possible field values are:
– Checked — Removes the selected rule from the access profile.
– Unchecked — Maintains the rules attached to the access profile.
2. Click . The Add Profile Rule Page opens:
Figure 38: Add Profile Rule Page
3. Define the Access Profile Name, Priority, Management Method, Interface, Source IP Address, Network Mask
or Prefix Length, and Action fields.
4. Click . The profile rule is added to the access profile, and the device is updated.