Configuring Security
Access Profiles
Cisco Small Business 300 Series Managed Switch Administration Guide 203
16
STEP 2 To change the active access profile, select a profile from the Active Access
Profile drop down menu and click Apply. This makes the chosen profile the active
access profile.
A caution message is displayed if you selected Console Only. If you continue, you
are immediately disconnected from the web-based switch configuration utility
and can access the switch only through the console port.
A caution message displays if you selected any other access profile, warning you
that, depending on the selected access profile, you might be disconnected from
the web-based switch configuration utility.
STEP 3 Click OK to select the active access profile or click Cancel to discontinue the
action.
STEP 4 Click Add to open the Add Access Profile Page. The page allows you to configure
a new profile and one rule. Go to the Defining Profile Rules section for
instructions on how to construct a rule.
STEP 5 Enter the parameters.
• Access Profile Name—Enter an access profile name. The access profile
name can contain up to 32 characters.
• Rule Priority—Enter the rule priority. When the packet is matched to a rule,
user groups are either granted or denied access to the switch. The rule
priority is essential to matching packets to rules, as packets are matched on
a first-match basis. One is the highest priority.
• Management Method—Select the management method for which the rule
is defined. Users with this access profile can only access the switch by using
the management method selected. The options are:
- All—Assigns all management methods to the rule.
- Telnet—Users requesting access to the switch who meet the Telnet
access profile criteria are permitted or denied access.
- Secure Telnet (SSH)—Users requesting access to the switch who meet
the SSH access profile criteria, are permitted or denied access.
- HTTP—Assigns HTTP access to the rule. Users requesting access to the
switch who meet the HTTP access profile criteria, are permitted or
denied.
- Secure HTTP (HTTPS)—Users requesting access to the switch who
meet the HTTPS access profile criteria, are permitted or denied.