Chapter 6. Administration of the Telecommuting Module
SSH
Check the check box if this computer/network should be allowed to configure the Telecom-
muting Module via SSH.
HTTP
Check the check box if this computer/network should be allowed to configure the Telecom-
muting Module via HTTP.
HTTPS
Check the check box if this computer/network should be allowed to configure the Telecom-
muting Module via HTTPS.
Log Class
Here, you enter what log class the Telecommuting Module should use to log the configura-
tion traffic to the Telecommuting Module's web server. Log classes are defined on the Log
Classes page under Logging. See also chapter 14 of the User Manual.
No.
The No. field determines the order of the lines. The order is important in deciding what
is logged and warned for. The Telecommuting Module uses the first line that matches the
configuration traffic.
Perhaps you want to configure the Telecommuting Module so that configuration traffic from
one specific computer is simply logged while traffic from the rest of that computer's network
is both logged and generates alarms.
The rules are used in the order in which they are listed, so if the network is listed first, all
configuration traffic from that network is both logged and generates alarms, including the
traffic from that individual computer. But if the individual computer is listed on a separate
line before the network, that line will be considered first and all configuration traffic from
that computer is only logged while the traffic from the rest of the computer's network is both
logged and generates alarms.
Delete Row
If you select this box, the row is deleted when you click on Create new rows, Save, or Look
up all IP addresses again.
Create
Enter the number of new rows you want to add to the table, and then click on Create.
Save
Saves the Access Control configuration to the preliminary configuration.
51
Need help?
Do you have a question about the BETA and is the answer not in the manual?
Questions and answers