Login Rules

A login rule specifies the constraints for logging in to the edge management system, including the login time, login IP address segment, and login MAC address. The constraints in a single rule must be met at the same time, and one of multiple rules must meet the constraints.

Adding a Login Rule

  1. Choose Settings > Security Policy > Login Rules.
    Figure 1 Login rules
  2. Click Add Rule.
    Figure 2 Adding a login rule
  3. Set a login rule based on the information provided in Table 1.

    The login is not restricted if the login rule parameter is empty, the rule status is Enabled, and the rule is saved.

  4. Click Confirm.

    The message "Saved successfully" is displayed, indicating that a login rule is successfully added.

Modifying a Login Rule

  1. Choose Settings > Security Policy > Login Rules.
    Figure 3 Login rules
  2. Click Modify in the Operation column of the rule to be modified.
    Figure 4 Modifying a login rule
  3. Modify a login rule based on the information provided in Table 1.
  4. Click Confirm.

    The message "Saved successfully" is displayed, indicating that a login rule is successfully modified.

Deleting a Login Rule

  1. Choose Settings > Security Policy > Login Rules.
    Figure 5 Login rules
  2. Click Delete in the Operation column of the rule to be deleted.
    Figure 6 Deleting a login rule
  3. In the Current User Password text box, enter the password of the current user.
  4. Click Confirm.

    The message "Delete successfully" is displayed, indicating that the login rule is deleted successfully.

Changing the Status of a Login Rule

  1. Choose Settings > Security Policy > Login Rules.
    Figure 7 Login rules
  2. Click Modify in the Operation column of the rule to be enabled and change the status of the login rule.
    • Click to change it to , indicating that the rule is disabled.
    • Click to change it to , indicating that the rule is enabled.
    Figure 8 Modifying a login rule

    The login is not restricted if the login rule parameter is empty, the rule status is Enabled, and the rule is saved.

  3. In the Current User Password text box, enter the password of the current user.
  4. Click Confirm.

    A message is displayed in the upper right corner of the page, indicating that the login rule is modified successfully.

Exporting Login Rules

  1. Choose Settings > Security Policy > Login Rules.
    Figure 9 Login rules
  2. Click Export to save the login rules of the current system to the local PC.
    Figure 10 Exporting rules

    You are not allowed to modify the exported file. Otherwise, the file cannot be used.

Importing Login Rules

Login rules cannot be constructed. You can only export login rules online on the web client and import them to other devices.

  1. Choose Settings > Security Policy > Login Rules.
    Figure 11 Login rules
  2. Click Import. The Import Login Rules dialog box is displayed.
    Figure 12 Importing login rules
  3. Click and select a file. Upload an .ini file whose size is less than 10 KB.
    • After the file is imported, the original login rules in the system are overwritten.
    • The name of the file to be imported contains 1 to 255 characters, including uppercase and lowercase letters (a to z and A to Z), digits (0 to 9), and other characters (_.-). The file name cannot contain two consecutive dots (..) and the suffix must be ini.
    • A maximum of 30 login rules can be configured in the imported file.
  4. In the Current User Password text box, enter the password of the current user.
  5. Click Confirm.

    A message is displayed, indicating that login rules are successfully imported.

Parameter Description

Table 1 Login rules

Parameter

Description

Login Time

Time period in which users are allowed to log in. The format is as follows:

xx:xx: indicates the daily login period. For example, the start time is 06:00 and the end time is 12:00.

NOTE:
  • The start and end time for a login rule must be in the same format.
  • The start time and end time of a rule must be configured at the same time.

IP Network Segment

IP address or IP address segment allowed for login. The value is an IPv4 address in either of the following formats:
  • xxx.xxx.xxx.xxx: indicates a single IP address.
  • xxx.xxx.xxx.xxx/mask: indicates an IP address segment. mask indicates the subnet mask length, and ranges from 1 to 32.

MAC Address

MAC address or MAC address header allowed for login. The value can be in one of the following formats:
  • xx:xx:xx:xx:xx:xx: indicates a single MAC address.
  • xx:xx:xx: indicates the MAC address header.

Status

Indicates whether to enable the login rule. You can click to filter the status of a login rule. The options are as follows:
  • Enable
  • Disable
NOTE:

After the filtering, you can click Reset to clear the filtering content.

If the login rule is enabled and the rule parameters are empty, the login is not restricted.

Current User Password

Inputs the password of the current user.