Security Rules
226
APM Installation, Configuration, and User’s Guide
Security Rule List
The Security Rule List form displays a list of all Security Rules that you can
assign to a user or user group. The list contains four columns:
Day/Time
Enter the date and time in which the user can
access the system.
Authorized Actions
Define the specific authorized action (e.g.,
Connect to a console, connect to a KVM/net,
Connect to the web management interface,
etc) for this rule.
Table 4-38:
Security Rule List Column Descriptions
Column Name
Definition
Rule Name
The name of the rule and, if applicable, the
source IPs allowed for this rule.
Description
A brief description of the rule and, if
applicable, the interfaces and the date/time
allowed for this rule.
Status
States if the rule is “Enabled” or “Disabled;”
if applicable, lists all authorized actions for
the current rule.
Permission
States whether the rule is to “Allow” or
“Deny.”
Table 4-37:
Summary of Security Rule Forms
Form Title
Use this form to:
Summary of Contents for AlterPath Manager 2500
Page 16: ...xiv AlterPath Manager Installation Configuration and User s Guide ...
Page 20: ...xviii AlterPath Manager Installation Configuration and User s Guide ...
Page 32: ...AdditionalResources xxx APM Installation Configuration and User s Guide ...
Page 52: ...OnSite Support 20 APM Installation Configuration and User s Guide ...
Page 74: ...Pre Configuration Requirements 42 APM Installation Configuration and User s Guide ...
Page 116: ...User s Profile 84 APM Installation Configuration and User s Guide ...
Page 286: ...Redundant Fault Tolerant Configuration 254 APM Installation Configuration and User s Guide ...
Page 364: ...332 APM Installation Configuration and User s Guide ...