4. Enter the IP address and subnet mask for the remote host that is allowed
5. Choose Save & apply.
Using IP Tables
Linux and UNIX systems have an IP filtering program called IPtables.
Administrators desiring to add further security by controlling access to the Digi
CM should look at this program. Information about IPtables can be found on
most Linux or UNIX systems by viewing the man pages.
Configuring User Access Control
Another method to control access to the serial ports on the Digi CM is through
the User Access Control configuration. This configuration can be done on a
per port basis or globally by selecting the All Ports option. There are three
options for user access control: None, Restricted user list, and Permitted user
list. Users must have already been added to the system before they can be
entered on a Restricted or Permitted user list or for a Sniff Session user list.
Chapter 7
access.
MIKE
•
When None is selected, any user that is registered on the authentica-
tion server can access a serial port.
•
When Restricted user list is selected, a user cannot access a serial port
even if they are registered on an authentication server.
Configuring Security and Authentication
JOE
51