Setting Up Role-Based Access Control Rules

Role-based access control rules are similar to firewall rules, except they are applied to members sharing a specific role. This enables you to grant system permissions to a specific role, based on their IP addresses.

  1. Enable the feature. See Enabling the Feature.
  2. Set the default policy. See Changing the Default Policy.
  3. Create rules specifying which addresses to accept and which ones to discard when the addresses are associated with a specific role. See Creating Role-Based Access Control Rules.

Changes made do not affect users currently logged in until the next login.

In This Section

Enabling the Feature

Changing the Default Policy

Creating Role-Based Access Control Rules

Editing Role-Based Access Control Rules

Sorting Role-Based Access Control Rules

Deleting Role-Based Access Control Rules

See Also

Access Security Control

Configuring the Firewall

Setting Up User Login Controls