1.10 How to configure a whitelist for remote management to
prevent unauthorized access
The example shows administrators how to configure a whitelist for host
devices that prevents attempted access from unauthorized devices or
subnets. The whitelist inspects the source IP addresses of hosts and the
types of services accessing the switch (Ex: Telnet, FTP, HTTP.....).
Configure the whitelist for remote management
Note:
All network IP addresses and subnet masks are used as examples in this article.
Please replace them with your actual network IP addresses and subnet masks. This
example was tested using XGS4600-32 (Firmware Version: V4.50).
www.zyxel.com
47/215