Chapter 6. Administration of the Telecommuting Module
SSH
Check the check box if this computer/network should be allowed to configure the Telecom- muting Module via SSH.
HTTP
Check the check box if this computer/network should be allowed to configure the Telecom- muting Module via HTTP.
HTTPS
Check the check box if this computer/network should be allowed to configure the Telecom- muting Module via HTTPS.
Log Class
Here, you enter what log class the Telecommuting Module should use to log the configura- tion traffic to the Telecommuting Module’s web server. Log classes are defined on the Log Classes page under Logging. See also chapter 14 of the User Manual.
No.
The No. field determines the order of the lines. The order is important in deciding what is logged and warned for. The Telecommuting Module uses the first line that matches the configuration traffic.
Perhaps you want to configure the Telecommuting Module so that configuration traffic from one specific computer is simply logged while traffic from the rest of that computer’s network is both logged and generates alarms.
The rules are used in the order in which they are listed, so if the network is listed first, all configuration traffic from that network is both logged and generates alarms, including the traffic from that individual computer. But if the individual computer is listed on a separate line before the network, that line will be considered first and all configuration traffic from that computer is only logged while the traffic from the rest of the computer’s network is both logged and generates alarms.
Delete Row
If you select this box, the row is deleted when you click on Create new rows, Save, or Look up all IP addresses again.
Create
Enter the number of new rows you want to add to the table, and then click on Create.
Save
Saves the Access Control configuration to the preliminary configuration.
51