Screen Objective |
This screen allows the user to configure the
IP Authorized Manager. |
Navigation |
|
Fields |
- IP Address—enter
the Network or Host address from which the switch can be managed.
The maximum length of address is 15. An address 0.0.0.0 indicates
Any Manager.
- Subnet Mask—enter the subnet mask for
the configured IP address. The maximum length of subnet mask is
15. Value 0.0.0.0 indicates mask for Any Manager.
Note: By default,
the authorized manager is allowed to access the switch through all
ports. If a set of ports are configured in the Port List, the manager can
access the switch only through the configured ports
- Port List (Incoming)—enter the subnet
mask for the configured IP address. The maximum length of subnet
mask is 15. Value 0.0.0.0 indicates mask for Any Manager.
Note: The
configured subnet mask should be in the same subnet of the network
in which the switch is placed.
- VLANs Allowed—enter the VLANs in which the IP authorized
manager can reside
Note: By default, the manager is allowed to reside
in any VLAN. If a set of VLANs are configured in the VLANs Allowed list, the manager
can reside only in the configured VLAN set.
Access to the switch will be denied from any other VLAN.
|
Fields (cont) |
- Services Allowed—click
the allowed services through which the manager can access the switch. The
default option is ALL. Options are:
- ALL—Supports all services
- SNMP— SNMP (Simple Network
Management Protocol) is a set of protocols for managing complex
networks. SNMP works by sending
messages, called protocol data units ( PDU)s,
to different parts of a network. SNMP-compliant
devices or so called agents store data about themselves in Management Information
Bases ( MIB)s and return this
data to the SNMP requesters.
- TELNET—Telnet is a user command and an underlying TCP/IP protocol for accessing remote
computers. Through Telnet, an administrator or another user can
access someone else's computer remotely. On the Web, HTTP and FTP protocols
allow you to request specific files from remote computers, but not
to actually be logged on as a user of that computer. With Telnet,
the user can log on as a regular user with whatever privileges you
may have been granted to the specific application and data on that
computer.
- HTTP— HTTP (Hyper Text Transfer
Protocol) is an underlying protocol used by the World Wide Web. HTTP defines how messages are formatted
and transmitted, and what actions Web servers and browsers should
take in response to various commands. For example, when you enter
a URL in your browser, this actually sends an HTTP command to the Web server
directing it to fetch and transmit the requested Web screen.
- HTTPS—Another protocol for transmitting data securely over the
World Wide Web is Secure HTTP (S- HTTP). S- HTTP is
designed to transmit individual messages in a secured manner.
|
Fields (cont) |
- SSH—Secure Shell ( SSH) is a program to log into another
computer over a network, to execute commands in a remote machine,
and to move files from one machine to another. take over a network can
only force ssh to disconnect. He or she cannot play back the traffic
or hijack the connection when encryption is enabled.
|
Buttons |
- Add—adds and
saves new configuration.
- Reset—resets to default value for respective
fields and discards all user inputs.The attributes of the default
Queue Template cannot be modified.
- Apply—modifies attributes and saves the
changes.
- Delete—deletes the selected entry.
|