Using Ip Tables; Configuring User Access Control - Digi Connectware CM User Manual

Table of Contents

Advertisement

4. Enter the IP address and subnet mask for the remote host that is allowed
5. Choose Save & apply.

Using IP Tables

Linux and UNIX systems have an IP filtering program called IPtables.
Administrators desiring to add further security by controlling access to the Digi
CM should look at this program. Information about IPtables can be found on
most Linux or UNIX systems by viewing the man pages.

Configuring User Access Control

Another method to control access to the serial ports on the Digi CM is through
the User Access Control configuration. This configuration can be done on a
per port basis or globally by selecting the All Ports option. There are three
options for user access control: None, Restricted user list, and Permitted user
list. Users must have already been added to the system before they can be
entered on a Restricted or Permitted user list or for a Sniff Session user list.
Chapter 7
access.
MIKE
When None is selected, any user that is registered on the authentica-
tion server can access a serial port.
When Restricted user list is selected, a user cannot access a serial port
even if they are registered on an authentication server.
Configuring Security and Authentication
JOE
51

Advertisement

Table of Contents
loading

This manual is also suitable for:

Connectware cm 8Connectware cm 16Connectware cm 32

Table of Contents