Supermicro Web-based Management Utility User Manual page 47

For the superblade system
Table of Contents

Advertisement

Item
Name
4
Default Policy
5
Rule#
6
IP/Mask
7
Policy
8
Append
9
Insert
10
Replace
11
Delete
Max. Number of
12
Failed Logins
Block Time
13
(Minutes)
14
Apply
Reset to
15
Defaults
Table 7-3. Security Page Controls (Continued)
Description
When IP A
CCESS
Drop from this pull-down menu to either allow or deny access according to
pre-defined rules.
NOTE: If set to D
Internet connection, then an Internet connection over the LAN is
impossible. In this case, you need to change your security settings via
modem or by disabling the IP A
Enter a rule number in the box for a command (or commands) that will be
used by the IP A
Enter the IP address or an IP address range for which the command(s) will
be applied.
This item instructs the IPMI what to do with the matching packages.
NOTE: The sequence or the order of the rules is important; rules are
checked in ascending order until one matches. All rules below the
matching one will be ignored. The default policy applies if no matching
rules are found.
Select this option to add IP Address/Mask, rules or commands to the
existing ones.
Select this option to insert IP Address/Mask, rules or commands to the
existing ones.
Select this option to replace an old IP Address/Mask, rule or command with
a new one.
Select this option to delete (a part of) an existing IP Address/Mask, rule or
command.
Enter the maximum number of failed attempts or failed logins allowed for a
user. If the number of failed logins or attempts exceeds this maximum
number allowed, the user will be blocked from the system.
NOTE: If this box is left empty, the user is allowed to try to login to the
server indefinitely. For network security, this is not recommended.
Enter the number of minutes allowed for a user to attempt to login. If the
user fails to login within this time allowed, the user will be blocked from
system.
NOTE: If this box is left empty, the user is allowed to try to login to the
server indefinitely. For network security, this is not recommended.
Click this icon to apply the selections you made.
Click this icon if you want to reset the defaults for the Remote Console
button keys.
C
is enabled, you can select either Accept or
ONTROL
and you do not have a set of rules that will accept the
ROP
C
CCESS
C
.
CCESS
ONTROL
7-7
Chapter 7: Device Settings
.
ONTROL

Advertisement

Table of Contents
loading

Table of Contents