HP VCX Software manual Administration of the Telecommuting Module, Access Control

Page 55

Chapter 6. Administration of the Telecommuting Module

You also need to configure who can access the Telecommuting Module web interface. This is done on the Access Control page under Basic Configuration.

Remember that the configuration you see in the web interface (preliminary configuration) isn’t necessarily the work configuration (permanent configuration) of the Telecommuting Module. When all configuration is made in the web interface, it must be applied. This is done on the Save/Load Configuration page under Administration.

Access Control

On the Access Control page, settings are made which controls the access to the Telecom- muting Module administration interfaces. The Telecommuting Module can be configured via the web (http and https) and via ssh or the serial cable (using the CLI, see chapter 18 of the Reference Guide).

Select one or more configuration IP addresses for the Telecommuting Module. The config- uration address is the IP address to which you direct your web browser to access the web interface of the Telecommuting Module, or connect your ssh client to.

For each network interface, you also specify whether or not the Telecommuting Module can be configured via this network interface.

You also select what kind of authentication will be performed for the users trying to access the administration interfaces.

To further increase security, the Telecommuting Module can only be configured from one or a few computers that are accessed from one of these interfaces. Enter the IP address or addresses that can configure the Telecommuting Module. The IP addresses can belong to one or more computers. For each IP address or interval of addresses, select which configuration protocols are allowed.

Configuration Allowed Via Interface

This setting specifies whether configuration traffic is allowed via this interface. If you only allow configuration via eth1, configuration traffic will only be allowed from computers con- nected to the eth1 interface, regardless of which IP address the configuration traffic is di- rected to or which IP addresses the computers have.

The choices for each interface are On and Off. This configuration is a complement to the Configuration Computers setting below.

47

Image 55
Contents Getting started Guide 3Com VCX IP Telecommuting ModulePage 3Com VCX IP Telecommuting Module Getting started Guide Page Table of Contents Page Part I. Installation of the 3Com VCX IP Telecommuting Module Page DMZ Configuration What is a Telecommuting Module?Introduction Configuration alternativesStandalone Configuration DMZ/LAN ConfigurationOverview of the Installation License Conditions About settings in 3Com VCX IP Telecommuting ModuleInstallation with a serial cable Installing 3Com VCX IP Telecommuting ModuleInstallation Installation with magic pingPage Page Page Page Installation with a diskette Page Page Remember to lock up the Telecommuting Module Turning off a Telecommuting ModuleInstalling 3Com VCX IP Telecommuting Module Part II. Configuring 3Com VCX IP Telecommuting Module Page Telecommuting Module Type Network ConfigurationNetwork Configuration Telecommuting Module Type configuration Interface Network Interface 1General Interface name Directly Connected NetworksPhysical device StatusNetmask/Bits NameDNS Name Or IP Address IP addressAlias Routed network Static RoutingRouter Save Default GatewayCancel Main Default GatewaysInterface Policy For Packets From Unused GatewaysGateway Reference Hosts DynamicNetworks and Computers Subgroup NameLower Limit Create Upper LimitInterface/VLAN Delete RowAdditional Negotiators SurroundingsSurroundings NetworkData Interfaces Policy For Ping To Your 3Com VCX IP Telecommuting Module Default domain IP PolicyBasic Configuration Name of this Telecommuting ModuleDNS Servers Reverts all the above fields to their previous configuration Network Configuration SIP Module Basic SettingsAdditional SIP Signaling Ports SIP ConfigurationComment Provisioning RelaySIP Media Port Range TransportSIP Servers To Monitor Public IP address for NATed Telecommuting ModuleServer Log class for SIP license messages Log class for SIP signalingSIP Logging Log class for SIP packetsLog class for SIP media messages Log class for SIP errorsRouting DNS Override For SIP RequestsRelay To DomainAction FilteringSender IP Filter Rules From NetworkDefault Policy For SIP Requests Content TypesContent Type URI Encoding InteroperabilityAllow Remote NAT traversal Remote Clients Signaling Forwarding Remote SIP Connectivity Remote NAT TraversalNAT timeout for TCP NAT timeout for UDPNAT keepalive method Media Route Access Control Administration of the Telecommuting ModuleConfiguration Allowed Via Interface Configuration Transport User Authentication For Web Interface AccessConfiguration via SSH Configuration ComputersConfiguration via Http Configuration via HttpsNetmask/Bits Range DNS Name Or Network AddressVia IPsec Peer Log Class SSHApply configuration Duration of limited test modeSave/Load Configuration Test Preliminary ConfigurationShow Message About Unapplied Changes BackupSave to diskette Save/Load CLI Command File Abort All Edits Revert to Old ConfigurationsReload Factory Configuration Administration of the Telecommuting Module DMZ type Firewall and Client ConfigurationFirewall SIP clients DMZ/LAN typeOther Standalone type SIP clients Apply Index
Related manuals
Manual 446 pages 4.55 Kb