Cisco Sg3008 Manual
Here you can view all the pages of manual Cisco Sg3008 Manual. The Cisco manuals for Switch are available online for free. You can easily download all the documents as PDF.
Page 381
Security Management Access Method 344 Cisco Small Business 200, 300 and 500 Series Managed Switch Administration Guide (Internal Version) 18 A caution message displays if you selected any other access profile, warning you that, depending on the selected access profile, you might be disconnected from the web-based configuration utility. STEP 3Click OK to select the active access profile or click Cancel to discontinue the action. STEP 4Click Add to open the Add Access Profile page. The page allows...
Page 382
Security Management Access Method Cisco Small Business 200, 300 and 500 Series Managed Switch Administration Guide (Internal Version) 345 18 -All—Applies to all ports, VLANs, and LAGs. -User Defined—Applies to selected interface. •Interface—Enter the interface number if User Defined was selected. •Applies to Source IP Address—Select the type of source IP address to which the access profile applies. The Source IP Address field is valid for a subnetwork. Select one of the following values:...
Page 383
Security Management Access Method 346 Cisco Small Business 200, 300 and 500 Series Managed Switch Administration Guide (Internal Version) 18 STEP 1Click Security > Mgmt Access Method > Profile Rules. STEP 2Select the Filter field, and an access profile. Click Go. The selected access profile appears in the Profile Rule Table. STEP 3Click Add to add a rule. STEP 4Enter the parameters. •Access Profile Name—Select an access profile. •Rule Priority—Enter the rule priority. When the packet is matched to a...
Page 384
Security Management Access Authentication Cisco Small Business 200, 300 and 500 Series Managed Switch Administration Guide (Internal Version) 347 18 •Interface—Enter the interface number. •Applies to Source IP Address—Select the type of source IP address to which the access profile applies. The Source IP Address field is valid for a subnetwork. Select one of the following values: -All—Applies to all types of IP addresses. -User Defined—Applies to only those types of IP addresses defined in the...
Page 385
Security Secure Sensitive Data Management 348 Cisco Small Business 200, 300 and 500 Series Managed Switch Administration Guide (Internal Version) 18 If an authentication method fails or the user has insufficient privilege level, the user is denied access to the device. In other words, if authentication fails at an authentication method, the device stops the authentication attempt; it does not continue and does not attempt to use the next authentication method. To define authentication methods for an...
Page 386
Security SSL Server Cisco Small Business 200, 300 and 500 Series Managed Switch Administration Guide (Internal Version) 349 18 SSL Server This section describes the Secure Socket Layer (SSL) feature. SSL Overview The Secure Socket Layer (SSL) feature is used to open an HTTPS session to the device. An HTTPS session may be opened with the default certificate that exists on the device. Some browsers generate warnings when using a default certificate, since this certificate is not signed by a...
Page 387
Security SSL Server 350 Cisco Small Business 200, 300 and 500 Series Managed Switch Administration Guide (Internal Version) 18 •Valid To—Specifies the date up to which the certificate is valid. •Certificate Source—Specifies whether the certificate was generated by the system (Auto Generated) or the user (User Defined). STEP 2Select an active certificate. STEP 3Click Generate Certificate Request. STEP 4Enter the following fields: •Regenerate RSA Key—Select to regenerate the RSA key. •Key...
Page 388
Security SSH Server Cisco Small Business 200, 300 and 500 Series Managed Switch Administration Guide (Internal Version) 351 18 •Private Key (Encrypted)—Select and copy in the RSA private key in encrypted form. •Private Key (Plaintext)—Select and copy in the RSA private key in plain text form. STEP 4Click Display Sensitive Data as Encrypted to display this key as encrypted. When this button is clicked, the private keys are written to the configuration file in encrypted form (when Apply is...
Page 389
Security Configuring TCP/UDP Services 352 Cisco Small Business 200, 300 and 500 Series Managed Switch Administration Guide (Internal Version) 18 •Te l n e t—Disabled by factory default •SSH—Disabled by factory default The active TCP connections are also displayed in this window. To configure TCP/UDP services: STEP 1Click Security > TCP/UDP Ser vices. STEP 2Enable or disable the following TCP/UDP services on the displayed services. •HTTP Service—Indicates whether the HTTP service is enabled or...
Page 390
Security Defining Storm Control Cisco Small Business 200, 300 and 500 Series Managed Switch Administration Guide (Internal Version) 353 18 •Local IP Address—Local IP address through which the device is offering the service. •Local Port—Local UDP port through which the device is offering the service. •Application Instance—The service instance of the UDP service. (For example, when two senders send data to the same destination.) STEP 3Click Apply. The services are written to the Running Configuration...