Home > Cisco > Switch > Cisco Sg3008 Manual

Cisco Sg3008 Manual

Here you can view all the pages of manual Cisco Sg3008 Manual. The Cisco manuals for Switch are available online for free. You can easily download all the documents as PDF.

Page 381

Security
Management Access Method
344 Cisco Small Business 200, 300 and 500 Series Managed Switch Administration Guide (Internal Version) 
18
A caution message displays if you selected any other access profile, warning you 
that, depending on the selected access profile, you might be disconnected from 
the web-based configuration utility.
STEP  3Click OK to select the active access profile or click Cancel to discontinue the 
action. 
STEP  4Click Add to open the Add Access Profile page. The page allows...

Page 382

Security
Management Access Method
Cisco Small Business 200, 300 and 500 Series Managed Switch Administration Guide (Internal Version)  345
18
 
-All—Applies to all ports, VLANs, and LAGs.
-User Defined—Applies to selected interface.
•Interface—Enter the interface number if User Defined was selected.
•Applies to Source IP Address—Select the type of source IP address to 
which the access profile applies. The Source IP Address field is valid for a 
subnetwork. Select one of the following values:...

Page 383

Security
Management Access Method
346 Cisco Small Business 200, 300 and 500 Series Managed Switch Administration Guide (Internal Version) 
18
STEP 1Click Security > Mgmt Access Method > Profile Rules.
STEP  2Select the Filter field, and an access profile. Click Go.
The selected access profile appears in the Profile Rule Table.
STEP  3Click Add to add a rule.
STEP  4Enter the parameters.
•Access Profile Name—Select an access profile.
•Rule Priority—Enter the rule priority. When the packet is matched to a...

Page 384

Security
Management Access Authentication
Cisco Small Business 200, 300 and 500 Series Managed Switch Administration Guide (Internal Version)  347
18
 
•Interface—Enter the interface number.
•Applies to Source IP Address—Select the type of source IP address to 
which the access profile applies. The Source IP Address field is valid for a 
subnetwork. Select one of the following values:
-All—Applies to all types of IP addresses.
-User Defined—Applies to only those types of IP addresses defined in 
the...

Page 385

Security
Secure Sensitive Data Management
348 Cisco Small Business 200, 300 and 500 Series Managed Switch Administration Guide (Internal Version) 
18
If an authentication method fails or the user has insufficient privilege level, the user 
is denied access to the device. In other words, if authentication fails at an 
authentication method, the device stops the authentication attempt; it does not 
continue and does not attempt to use the next authentication method. 
To define authentication methods for an...

Page 386

Security
SSL Server
Cisco Small Business 200, 300 and 500 Series Managed Switch Administration Guide (Internal Version)  349
18
 
SSL Server
This section describes the Secure Socket Layer (SSL) feature.
SSL Overview
The Secure Socket Layer (SSL) feature is used to open an HTTPS session to the 
device. 
An HTTPS session may be opened with the default certificate that exists on the 
device.
Some browsers generate warnings when using a default certificate, since this 
certificate is not signed by a...

Page 387

Security
SSL Server
350 Cisco Small Business 200, 300 and 500 Series Managed Switch Administration Guide (Internal Version) 
18
•Valid To—Specifies the date up to which the certificate is valid. 
•Certificate Source—Specifies whether the certificate was generated by 
the system (Auto Generated) or the user (User Defined). 
STEP  2Select an active certificate.
STEP  3Click Generate Certificate Request. 
STEP  4Enter the following fields:
•Regenerate RSA Key—Select to regenerate the RSA key.
•Key...

Page 388

Security
SSH Server
Cisco Small Business 200, 300 and 500 Series Managed Switch Administration Guide (Internal Version)  351
18
 
•Private Key (Encrypted)—Select and copy in the RSA private key in 
encrypted form. 
•Private Key (Plaintext)—Select and copy in the RSA private key in plain text 
form. 
STEP  4Click Display Sensitive Data as Encrypted to display this key as encrypted. 
When this button is clicked, the private keys are written to the configuration file in 
encrypted form (when Apply is...

Page 389

Security
Configuring TCP/UDP Services
352 Cisco Small Business 200, 300 and 500 Series Managed Switch Administration Guide (Internal Version) 
18
•Te l n e t—Disabled by factory default
•SSH—Disabled by factory default
The active TCP connections are also displayed in this window.
To configure TCP/UDP services:
STEP 1Click Security > TCP/UDP Ser vices.
STEP  2Enable or disable the following TCP/UDP services on the displayed services.
•HTTP Service—Indicates whether the HTTP service is enabled or...

Page 390

Security
Defining Storm Control
Cisco Small Business 200, 300 and 500 Series Managed Switch Administration Guide (Internal Version)  353
18
 
•Local IP Address—Local IP address through which the device is offering 
the service.
•Local Port—Local UDP port through which the device is offering the service.
•Application Instance—The service instance of the UDP service. (For 
example, when two senders send data to the same destination.)
STEP  3Click Apply. The services are written to the Running Configuration...
Start reading Cisco Sg3008 Manual

Related Manuals for Cisco Sg3008 Manual

All Cisco manuals