Terminal Server User Guide
User authentication/logging
Page 68
Chapter 5 Modem authentication and logging
User authentication/logging
To improve access security, the Terminal Server has a mechanism for authenticating users
before allowing them access. This is accomplished by prompting the user for a Login ID and
a password. The Terminal Server will then attempt to login to a specified host using that ID
and password. If successful, the user is authenticated and allowed access. Otherwise, the
call is dropped. Your Terminal Server will also log events such as logins, logouts, connections
and disconnections, and power ups.
This feature is enabled when you set the Authentication field to host in the Port Setup Menu.
The following is the host authentication setup (via the Access section of the Administration
Menu):
The following fields are important:
Summary of Contents for 37687
Page 19: ...Page 19 show ports 167 show lines 167 show statistics 167 su 167 telnet 167 test 168 ...
Page 192: ...Terminal Server User Guide Diagnostics Page 192 ...
Page 210: ... A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Page 210 ...
Page 211: ... A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Page 211 ...