Western Telematic MPC-20VS20-2, MPC-20VD20-2, MPC-20VD20-1, MPC-20V-1 MPC-8H-2, MPC-8H-1 IP Security

Models: MPC-20VS20-1 MPC-8H-1 MPC-20VS16-3 MPC-20VD16-3 MPC-20V-1 MPC-8H-2 MPC-20VS20-2 MPC-20VD20-1 MPC-20VD20-2

1 204
Download 204 pages 27.87 Kb
Page 82
Image 82
5.9.3.IP Security

Basic Configuration

SYSLOG Address: The IP Address or domain name (up to 64 characters) for the Syslog Daemon that will receive log records generated by the MPC. For more information, please refer to Section 11. (Default = undefined.)

Ping Access: Enables/Disables response to the ping command. When Disabled, the MPC will not respond to Ping commands. Note that disabling Ping Access at the Network Port will not effect the operation of the Ping-No-Access Alarm. (Default = On.)

5.9.3.IP Security

The IP Security feature allows the MPC to restrict unauthorized IP addresses from establishing inbound Telnet connections to the unit. This allows you to grant Telnet access to only a specific group of IP addresses, or block a particular IP address completely. In the default state, the MPC accepts incoming IP connections from all hosts.

In the Text Interface, IP Security parameters are defined via item 5 in the Network Configuration menu (Figure 5.17.) In the Web Browser Interface, these parameters are found by clicking the "IP Security" link on the left hand side of the screen. In the default state, IP Security is disabled.

The IP Security Function employs a TCP Wrapper program which allows the use of standard, Linux operators, wild cards and net/mask pairs to create a host based access control list.

The IP Security configuration menus include "hosts.allow" and "hosts.deny" client lists. Basically, when setting up IP Security, you must enter IP addresses for hosts that you wish to allow in the Allow list, and addresses for hosts that you wish to deny in the Deny list. Since Linux operators, wild cards and net/mask pairs are allowed, these lists can indicate specific addresses, or a range of addresses to be allowed or denied.

When the IP Security feature is properly enabled, and a client attempts to connect, the MPC will perform the following checks:

1.If the client’s IP address is found in the "hosts.allow" list, the client will be granted immediate access. Once an IP address is found in the Allow list, the MPC will not check the Deny list, and will assume you wish to allow that address to connect.

2.If the client’s IP address is not found in the Allow list, the MPC will then proceed to check the Deny list.

3.If the client’s IP Address is found in the Deny list, the client will not be allowed to connect.

5-51

Page 82
Image 82
Western Telematic MPC-20VS20-2, MPC-20VD20-2, MPC-20VD20-1, MPC-20V-1 MPC-8H-2, MPC-20VD16-3, MPC-20VS16-3 manual IP Security