| .NETWORK. | VI Basic Operations |
|
|
|
|
| 4 Using the |
If you want to limit the IP addresses connectable to the
Method for registering the IP addresses that are allowed to connect
1)Insert a CF card into the card slot of your computer.
NOTE: A card adapter may be needed depending on your computer.
2)Create a directory named \NET in the CF card.
3)Create a text file that contains a list of the IP addresses that are allowed to connect to the
Description example 192.168.10.1 192.168.10.10 192.168.10.36 192.168.21.*
A wildcard (*) can be used. In the above example, 1 to 254 are effective.
4)Add an extension “.ip” to the text file and save it in the \NET directory or a directory hierarchically below it.
(Example: Autho.ip)
5)Insert the CF card into the
6)Connect to the
A record can be kept of the IP addresses of the machines that accessed the
Run the Telnet command “w_NLGON,” and the initial settings can be changed to display
NETLOG.
To get the data contained in the logs, access the
To get the data contained in the logs, access the
NETLOG.txt is up to 64 Kbytes in size. If the buffer is filled, the content is automatically erased and new logs are written to the file beginning with the 0 byte. However, if transfers to an external server have been set by the w_NLFTON command, the log data is transferred to the external server before being erased. The file name of this log data consists of the letters NL, the date (months, days and hours), and the extension “.txt.” (When transferred at 12 o’clock on April 1, the file name would be NL040112.txt.)
Telnet commands for logsw_NLGON | Displays NETLOG |
w_NLGOF | Hides NETLOG |
s_NLGCL | Erases the content of NETLOG |
w_NLFTON | Transfers NETLOG when the buffer is filled |
w_NLFTOF | Does not transfer NETLOG when the buffer is filled |
- 84 -