Chapter6. Basic Configuration

Range

TheRange shows all IP addresses from which the Telecommuting Module can be configured. The range is
calculatedfrom the configuration under DNS name or network address and Netmask/Bits. Check that the correct
informationwas entered in the DNS name or network address and Netmask/Bits fields.

Log Class

Here,you enter what log class the Telecommuting Module should use to log the configuration traffic to the
TelecommutingModule’s web server. Log classes are defined on the Log Classes page under Logging. See also
chapter11, Logging.

Log Rule No.

TheLog Rule No. field determines the order of the lines. The order is important in deciding what is logged and
warnedfor. The Telecommuting Module uses the first line that matches the configuration traffic.
Perhapsyou want to configure the Telecommuting Module so that configuration traffic from one specific computer
issimply logged while traffic from the rest of that computer’s network is both logged and generates alarms.
Therules are used in the order in which they are listed, so if the network is listed first, all configuration traffic from
thatnetwork is both logged and generates alarms, including the traffic from that individual computer. But if the
individualcomputer is listed on a separate line before the network, that line will be considered first and all
configurationtraffic from that computer is only logged while the traffic from the rest of the computer’s network is
bothlogged and generates alarms.
Delete Row
Ifyou select this box, the row is deleted when you click on Add new rows,Save, or Look up all IP addresses
again.
Create
Enterthe number of new rows you want to add to the table, and then click on Create.
Save
Savesthe Access Control configuration to the preliminary configuration.
Cancel
Revertsall the above fields to their previous configuration.
Look up all IP addresses again
Looksup the IP addresses for all DNS names on this page in the DNS servers you entered on the Basic
Configurationpage.
RADIUS
RADIUS(Remote Authentication Dial-In User Service) is an authentication system consisting of one or more
servers,and clients using the servers to authenticate users. You could, for example, equip the company modems
withRADIUS clients, demanding that a user connecting to a modem first identifies himself to the RADIUS server.
Serversand clients communicate via UDP.
3ComVCX IP Telecommuting Module uses RADIUS for authentication of Telecommuting Module administration.

RADIUS Servers

Enterthe server(s) that the Telecommuting Module should use. When more than one RADIUS server is entered,
makesure that their databases contain the same data, since the Telecommuting Module regards them all alike and
usesthe server which first replies to a request.
47