User Manual - Page 273

For GS724TPP-100NAS.

Loading ...
Loading ...
Loading ...
24-Port Gigabit (Hi-Power) PoE+ Ethernet Smart Managed Pro Switch with 2 SFP Ports
Manage Device Security User Manual273
3. In the address field of your web browser, enter the IP address of the switch.
If you do not know the IP address of the switch, see
Access the switch on-network and
connected to the Internet on page 18 or Access the switch off-network on page 27.
The Local Device Login page displays.
If you did not yet register the switch with your NETGEAR account, the Register
to unlock
all features page displays. For more information, see
Register the switch on page 31.
4. Enter one of the following passwords:
• After initial login, enter your local device password.
By default, the local device password is password
.
You must change this password
at initial login.
• If you previously managed the switch through the Insight app or
Cloud portal, enter
the Insight network password for the last Insight network location.
For information about the credentials, see
Credentials for the local browser UI on
page 30.
5. Click the Login
button.
The System Information page displays.
6. Select Security > Access
> Access Control > Access Rule Configuration.
7. From the Rule Type menu, select Permit or Deny to permit or deny access when the
selected rules are matched.
A Permit rule allows access from a device that matches the rule criteria. A Deny rule
blocks a device that matches the rule criteria.
8. From the Service T
ype menu, select the access method to which the rule is applied.
The policy is restricted by the selected access method. Possible access methods are
TFTP, HTTP,
Secure HTTP (SSL), and SNMP.
9. In the Source IP Address field, enter the source IP address from which the management
traffic originates.
10. In the Mask
field, specify the subnet mask from which the management traffic originates.
11. In the Priority
field, assign a priority to the rule.
The rules are validated against the incoming management request in ascending order of
their priorities. If
a rule matches, the action is performed and subsequent rules below that
rule are ignored. For example, if a source IP address 10.10.10.10 is configured with
priority 1 to permit, and the same source IP address 10.10.10.10 is also configured with
priority 2 to deny, then access is permitted if the profile is active, and the second rule is
ignored.
Loading ...
Loading ...
Loading ...