User's Manual

Table Of Contents
Smart Managed Pro Switches MS510TX and MS510TXPP
Manage Device Security User Manual238
7. Click the Apply button.
Your settings are saved.
By default, the new access profile is deactivated, that is, the Deactivate Profile radio
button is selected. The Profile Summary does not yet display any information for the
access profile because you did not yet add any access rules.
Add an Access Rule
After you create an access control profile, you must add on ore more security access rules to
the profile.
To add an access rule for an access profile:
1. Connect your computer to the same network as the switch.
You can use a WiFi or wired connection to connect your computer to the network, or
connect directly to a switch that is off-network using an Ethernet cable.
2. Launch a web browser.
3. In the address field of your web browser, enter the IP address of the switch.
If you do not know the IP address of the switch, see Access the Switch on page 14.
The login window opens.
4. Enter the switch’s password in the Password field.
The default password is password.
The System Information page displays.
5. Select Security > Access > Access Control > Access Rule Configuration.
The Access Rule Configuration page displays.
6. From the Rule Type menu, select Permit or Deny to permit or deny access when the
selected rules are matched.
A Permit rule allows access by traffic that matches the rule criteria. A Deny rule blocks
traffic that matches the rule criteria.
7. From the Service Type menu, select the access method to which the rule is applied.
The policy is restricted by the selected access method. Possible access methods are
HTTP, Secure HTTP (SSL), and SNMP.
8. In the Source IP Address field, enter the source IP address of the client originating the
management traffic.
9. In the Mask field, specify the subnet mask of the client that originates the management
traffic.
10. In the Priority field, assign a priority to the rule.
The rules are validated against the incoming management request in ascending order of
their priorities. If a rule matches, the action is performed and subsequent rules below that