Chapter 6. Basic Configuration

Configuration via SSH

Select which IP address and port the Telecommuting Module administrator should direct her ssh client to when SSH is used for Telecommuting Module configuration. You can select from the Telecommuting Module IP addresses configured on the Interface pages under Network Configuration.

For SSH configuration, the Command Language Interface is used. See also chapter 18, Command Line Reference.

You can use different IP addresses for HTTP, HTTPS, and SSH configuration.

Configuration Computers

Enter the IP address or addresses that can configure the Telecommuting Module. The IP addresses can belong to one or more computers.

Note that you must also allow configuration via the Telecommuting Module interface that the computers are connected to. See Configuration Allowed Via Interface above.

No.

The No. field determines the order of the lines. The order is important in deciding what is logged and warned for. The Telecommuting Module uses the first line that matches the configuration traffic.

Perhaps you want to configure the Telecommuting Module so that configuration traffic from one specific computer is simply logged while traffic from the rest of that computer’s network is both logged and generates alarms.

The rules are used in the order in which they are listed, so if the network is listed first, all configuration traffic from that network is both logged and generates alarms, including the traffic from that individual computer. But if the individual computer is listed on a separate line before the network, that line will be considered first and all configuration traffic from that computer is only logged while the traffic from the rest of the computer’s network is both logged and generates alarms.

DNS Name Or Network Address

Enter the DNS name or IP address of the computer or network from which the Telecommut- ing Module can be configured. Avoid allowing configuration from a network or computer on the Internet or other insecure networks, or use HTTPS or IPsec to connect to the Telecom- muting Module from these insecure networks.

80