Security
51
Important
Considerations
Consider the following guidelines
before
you configure trusted IP clients
on your system.
Procedures
Configure trusted IP clients in this order:
1
Define the trusted IP clients.
2
Display the list of configured trusted IP clients to verify that you have
configured them correctly.
3
Enable the checking for trusted IP clients (using the access option on the
Administration Console or the System Configuration form in the Web
Management software).
CAUTION:
Be careful when you define trusted IP clients. If you specify an
incorrect IP address or subnetwork, you can affect your ability to access
the system, as follows:
■
For Web Management access, the change is immediate. Therefore, an
incorrect IP address or subnet forces you to reestablish local access via
the serial port.
■
For Telnet access, the change takes effect at your next login.
Additional
considerations
■
If you modify a trusted IP client definition through the Web
Management software, the change also affects Telnet and SNMP
access to the system. If you modify a trusted IP client definition
through Telnet access to the Administration Console, the change also
affects SNMP and Web Management access to the system.
■
Use the subnet mask to allow all addresses on a particular subnetwork
to have trusted access. For example, the IP address 158.101.112.219
with a subnet mask of 255.255.255.0 allows all addresses on the
158.101.112 subnetwork to have trusted access, whereas the same IP
address with a subnet mask of 255.255.255.255 only allows only
access by 158.101.112.219.
■
The trusted IP client information is retained, that is, saved in nvData
after a system reboot.
Summary of Contents for CoreBuilder 3500
Page 44: ...44 CHAPTER 2 MANAGEMENT ACCESS ...
Page 58: ...58 CHAPTER 3 SYSTEM PARAMETERS ...
Page 86: ...86 CHAPTER 5 ETHERNET ...
Page 112: ...112 CHAPTER 6 FIBER DISTRIBUTED DATA INTERFACE FDDI ...
Page 208: ...208 CHAPTER 9 VIRTUAL LANS ...
Page 256: ...256 CHAPTER 10 PACKET FILTERING ...
Page 330: ...330 CHAPTER 12 VIRTUAL ROUTER REDUNDANCY PROTOCOL VRRP ...
Page 356: ...356 CHAPTER 13 IP MULTICAST ROUTING ...
Page 418: ...418 CHAPTER 14 OPEN SHORTEST PATH FIRST OSPF ...
Page 519: ...RSVP 519 Figure 94 Sample RSVP Configuration Source station End stations Routers ...
Page 566: ...566 CHAPTER 18 DEVICE MONITORING ...
Page 572: ...572 APPENDIX A TECHNICAL SUPPORT ...
Page 592: ...592 INDEX ...