Configuring with Web Based Management
5.7 The "Security" menu
● HTTPS
Specify whether the station (or the IPv4 address) can access the device using the HTTPS
protocol.
● SSH
Specify whether the station (or the IPv4 address) can access the device using the SSH
protocol.
● Px.y
Specify whether the station (or the IPv4 address) can access the device via this port.
The port is made up of the module number and the port number, for example port 0.1 is
module 0, port 1.
Steps in configuration
Note
Before you enable this function, note the following
A bad configuration may mean that you can no longer access the device. You can then only
remedy this by resetting the device to the factory defaults and then reconfiguring. You should
therefore configure an access rule that allows access to the management before you enable
the function.
Note
Keep to the order
The order in which you create the ACL rules corresponds to the order in which the rules are
checked. As soon as a rule matches, it is used. The following rules are ignored.
Create new rule
1. Enter the IP address address in the "IP Address" input box.
2. Enter the subnet mask in the "Subnet Mask" input box.
3. Click the "Create" button to create a new row in the table.
4. Configure the entries of the new row.
5. Click the "Set Values" button to transfer the new entry to the device.
Enabling function
1. Select the "Management ACL" check box.
2. Click the "Set Values" button to enable the configured access rules.
Change rule
1. Configure the data of the rule you want to change.
2. Click the "Set Values" button to transfer the changes to the device.
260
SCALANCE XB-200/XC-200/XP-200 Web Based Management
Configuration Manual, 07/2016, C79000-G8976-C360-04