Cyclades User's Guide manual 222

Models: User's Guide

1 506
Download 506 pages 21.21 Kb
Page 238
Image 238

Configuration

The following table show the enabled protocols and services under each Security Profile.

Table 4-6:Enabled Protocols and Services under each Security Profile

Security Profile

SSH Access

Web Access

Protocols

 

 

 

 

Secured

• SSHv2

• HTTPS

 

Moderate

• SSHv1

• HTTP

• ICMP

(Default)

• SSHv2

• HTTPS

 

 

• SSH root access

• HTTP redirection to

 

 

 

HTTPS

 

Open

• SSHv1

• HTTP

• Telnet

 

• SSHv2

• HTTPS

• SNMP

 

• SSH root access

 

• RCP

 

Direct Access to

 

• ICMP

 

 

 

 

KVM Ports

 

 

 

 

 

 

Custom Security Profile

The Custom Security Profile opens up a dialog box to allow custom configuration of individual protocols and services.

Caution! By default a number of protocols and services are enabled in the Custom Security Profile, however, the protocols and services are user configurable for site specific requirements. Take the required precautions to understand the potential impacts of each individual service configured under Custom Security Profile.

The following table show the available protocols and services under the Custom Security Profile.

222

AlterPath KVM/net Installation, Administration, and User’s Guide

Page 238
Image 238
Cyclades User's Guide manual 222