IP Authorized Manager

This screen allows the user to configure the IP Authorized Manager.

Figure 1. IP Authorized Manager


Screen Objective This screen allows the user to configure the IP Authorized Manager.
Navigation

System > IP Authorized Manager

Fields
  • IP Address—enter the Network or Host address from which the switch can be managed. The maximum length of address is 15. An address 0.0.0.0 indicates Any Manager.
  • Subnet Mask—enter the subnet mask for the configured IP address. The maximum length of subnet mask is 15. Value 0.0.0.0 indicates mask for Any Manager.
    Note: By default, the authorized manager is allowed to access the switch through all ports. If a set of ports are configured in the Port List, the manager can access the switch only through the configured ports
  • Port List (Incoming)—enter the subnet mask for the configured IP address. The maximum length of subnet mask is 15. Value 0.0.0.0 indicates mask for Any Manager.
    Note: The configured subnet mask should be in the same subnet of the network in which the switch is placed.
  • VLANs Allowed—enter the VLANs in which the IP authorized manager can reside
    Note: By default, the manager is allowed to reside in any VLAN. If a set of VLANs are configured in the VLANs Allowed list, the manager can reside only in the configured VLAN set. Access to the switch will be denied from any other VLAN.
Fields (cont)
  • Services Allowed—click the allowed services through which the manager can access the switch. The default option is ALL. Options are:
    • ALL—Supports all services
    • SNMP— SNMP (Simple Network Management Protocol) is a set of protocols for managing complex networks. SNMP works by sending messages, called protocol data units ( PDU)s, to different parts of a network. SNMP-compliant devices or so called agents store data about themselves in Management Information Bases ( MIB)s and return this data to the SNMP requesters.
    • TELNET—Telnet is a user command and an underlying TCP/IP protocol for accessing remote computers. Through Telnet, an administrator or another user can access someone else's computer remotely. On the Web, HTTP and FTP protocols allow you to request specific files from remote computers, but not to actually be logged on as a user of that computer. With Telnet, the user can log on as a regular user with whatever privileges you may have been granted to the specific application and data on that computer.
    • HTTP— HTTP (Hyper Text Transfer Protocol) is an underlying protocol used by the World Wide Web. HTTP defines how messages are formatted and transmitted, and what actions Web servers and browsers should take in response to various commands. For example, when you enter a URL in your browser, this actually sends an HTTP command to the Web server directing it to fetch and transmit the requested Web screen.
    • HTTPS—Another protocol for transmitting data securely over the World Wide Web is Secure HTTP (S- HTTP). S- HTTP is designed to transmit individual messages in a secured manner.
Fields (cont)
  • SSH—Secure Shell ( SSH) is a program to log into another computer over a network, to execute commands in a remote machine, and to move files from one machine to another. take over a network can only force ssh to disconnect. He or she cannot play back the traffic or hijack the connection when encryption is enabled.
Buttons
  • Add—adds and saves new configuration.
  • Reset—resets to default value for respective fields and discards all user inputs.The attributes of the default Queue Template cannot be modified.
  • Apply—modifies attributes and saves the changes.
  • Delete—deletes the selected entry.