NetLinx Security within the Web Server

 

 

 

System Level Security Page (Cont.)

 

 

Feature

 

Description

 

 

 

 

Telnet Access:

 

This selection determines if a username and password is

 

 

required for Telnet Access (see FIG. 37).

 

 

• If Telnet access is enabled, a username and password is

 

 

required before allowing communication over either the Telnet

 

 

and/or SSH Ports. SSH version 2 is only supported.

 

 

• This authorized user must have sufficient access rights to login

 

 

through a Telnet session to the Master.

 

 

• To establish a secure Telnet connection, an administrator can

 

 

decide to disable the Telnet Port and then enable the SSH

 

 

Port. Refer to theSetting the Master’s Port

 

 

Configurations section on page 61.

 

 

 

Configuration (security):

 

This selection determines if a username and password is

 

 

required before allowing a group/user to alter the current

 

 

Master’s security configuration and communication settings (see

 

 

FIG. 37).

 

 

• Configuration access provides the user with the ability to

 

 

perform configuration functions on the NetLinx system through

 

 

NetLinx Studio. This includes such things as: IP

 

 

configuration/Reset, URL list settings, Master

 

 

communication settings, and security parameters.

 

 

• If security Configuration is enabled, a user/group must have

 

 

sufficient access rights to access the Main Security Menu.

 

 

• Any time a configuration operation is performed, the Master

 

 

verifies the current access rights for that feature and then

 

 

requires a valid username and password

 

 

(if not already logged in).

 

 

- An example would be if you are trying to add a New User or

 

 

modify the rights of an existing Group.

 

 

 

ICSP Connectivity:

 

This selection determines if a username and password is

 

 

required prior to communication with a target NetLinx Master via

 

 

an ICSP connection using any transport method (TCP/IP, UDP/

 

 

IP, and RS-232) (see FIG. 37).

 

 

• If this access is enabled and the user is not logged-in, when

 

 

the user attempts to connect, the authentication fails and

 

 

displays an “Access not allowed” message.

 

 

• This feature allows communication amongst various AMX

 

 

hardware and software components. This feature works in

 

 

tandem with the Require Encryption option to require that any

 

 

application or hardware communicating with the Master must

 

 

provide a valid username and password.

 

 

• Refer to theICSP Authentication section below for more

 

 

detailed information.

 

 

 

Require Encryption:

 

Requires that any data being transmitted or received via an

 

 

ICSP connection (among the various AMX products) be

 

 

encrypted and that any application or hardware communicating

 

 

with the Master over ICSP must provide a valid username and

 

 

password.

 

 

 

The following graphic illustrates the Ports which can be enabled for the validation of rights by using a valid username and password. When one of the above options is enabled, the Master then requires the entry of a valid username and password to validate rights for that action and then grant or deny access.

NI-3101-SIG Signature Series NetLinx Integrated Controller

41

 

 

Page 51
Image 51
AMX NI-3101-SIG manual Port. Refer to theSetting the Master’s Port, If not already logged