HP VCX Software manual Configuration Computers, Configuration via Https, Configuration via SSH

Page 57

Chapter 6. Administration of the Telecommuting Module

Configuration via HTTP

Select which IP address and port the Telecommuting Module administrator should direct her web browser to when HTTP is used for Telecommuting Module configuration. You can select from the Telecommuting Module IP addresses configured on the Interface pages under Network Configuration.

You can use different IP addresses for HTTP, HTTPS, and SSH configuration.

Configuration via HTTPS

Select which IP address and port the Telecommuting Module administrator should direct her web browser to when HTTPS is used for Telecommuting Module configuration. You can select from the Telecommuting Module IP addresses configured on the Interface pages under Network Configuration.

You can use different IP addresses for HTTP, HTTPS, and SSH configuration.

You also need to select an X.509 certificate, which works as an ID card, identifying the Telecommuting Module to your web browser. This will ensure that you are really commu- nicating with your Telecommuting Module and not somebody else’s computer. HTTPS uses an encryption method using two keys, one secret and one public. The secret key is kept in the Telecommuting Module and the public key is used in the certificate. If any of the keys is changed, the HTTPS connection won’t work.

All local certificates for the Telecommuting Module are created on the Certificates page under Basic Configuration.

Configuration via SSH

Select which IP address and port the Telecommuting Module administrator should direct her ssh client to when SSH is used for Telecommuting Module configuration. You can se- lect from the Telecommuting Module IP addresses configured on the Interface pages under Network Configuration.

For SSH configuration, the Command Language Interface is used. See also chapter 18 of the Reference Guide.

You can use different IP addresses for HTTP, HTTPS, and SSH configuration.

Configuration Computers

Enter the IP address or addresses that can configure the Telecommuting Module. The IP addresses can belong to one or more computers.

Note that you must also allow configuration via the Telecommuting Module interface that the computers are connected to. See Configuration Allowed Via Interface above.

49

Image 57
Contents Getting started Guide 3Com VCX IP Telecommuting ModulePage 3Com VCX IP Telecommuting Module Getting started Guide Page Table of Contents Page Part I. Installation of the 3Com VCX IP Telecommuting Module Page Introduction What is a Telecommuting Module?Configuration alternatives DMZ ConfigurationStandalone Configuration DMZ/LAN ConfigurationOverview of the Installation License Conditions About settings in 3Com VCX IP Telecommuting ModuleInstallation Installing 3Com VCX IP Telecommuting ModuleInstallation with magic ping Installation with a serial cablePage Page Page Page Installation with a diskette Page Page Remember to lock up the Telecommuting Module Turning off a Telecommuting ModuleInstalling 3Com VCX IP Telecommuting Module Part II. Configuring 3Com VCX IP Telecommuting Module Page Telecommuting Module Type Network ConfigurationNetwork Configuration Interface Network Interface 1 Telecommuting Module Type configurationGeneral Physical device Directly Connected NetworksStatus Interface nameDNS Name Or IP Address NameIP address Netmask/BitsAlias Static Routing Routed networkRouter Cancel Default GatewayMain Default Gateways SaveGateway Reference Hosts Policy For Packets From Unused GatewaysDynamic InterfaceNetworks and Computers Name SubgroupLower Limit Interface/VLAN Upper LimitDelete Row CreateSurroundings SurroundingsNetwork Additional NegotiatorsData Interfaces Basic Configuration Default domain IP PolicyName of this Telecommuting Module Policy For Ping To Your 3Com VCX IP Telecommuting ModuleDNS Servers Reverts all the above fields to their previous configuration Network Configuration Additional SIP Signaling Ports Basic SettingsSIP Configuration SIP ModuleSIP Media Port Range Provisioning RelayTransport CommentPublic IP address for NATed Telecommuting Module SIP Servers To MonitorServer SIP Logging Log class for SIP signalingLog class for SIP packets Log class for SIP license messagesRouting Log class for SIP errorsDNS Override For SIP Requests Log class for SIP media messagesRelay To DomainSender IP Filter Rules FilteringFrom Network ActionContent Types Default Policy For SIP RequestsContent Type Interoperability URI EncodingAllow Remote SIP Connectivity Remote Clients Signaling ForwardingRemote NAT Traversal Remote NAT traversalNAT timeout for UDP NAT timeout for TCPNAT keepalive method Media Route Administration of the Telecommuting Module Access ControlConfiguration Allowed Via Interface Configuration Transport User Authentication For Web Interface AccessConfiguration via Http Configuration ComputersConfiguration via Https Configuration via SSHDNS Name Or Network Address Netmask/Bits RangeVia IPsec Peer Log Class SSHSave/Load Configuration Duration of limited test modeTest Preliminary Configuration Apply configurationBackup Show Message About Unapplied ChangesSave to diskette Save/Load CLI Command File Revert to Old Configurations Abort All EditsReload Factory Configuration Administration of the Telecommuting Module Firewall and Client Configuration DMZ typeFirewall DMZ/LAN type SIP clientsOther Standalone type SIP clients Apply Index
Related manuals
Manual 446 pages 4.55 Kb