System Administration
91
VGA Grid User Guide
2.
Select
Viewer Access
.
3.
Enter and repeat the new password. The password is case sensitive and can
include up to 255 ASCII characters.
4.
Select
Apply
.
5.
Distribute or communicate the viewer access password to authorized
viewers of the broadcast.
11.3.2
Configuring IP-based Authentication for Viewers
This function allows the option of providing access to the broadcast to a large
number of users without having each individual user log in with the viewer
username and password. This is done by configuring individual IP addresses or a
range of IP addresses that are either granted access or denied access to the
broadcast. Once set up, users can access the broadcast just by clicking on a supplied
link. The administrator for the broadcast would continue to access the Web admin
interface using the administrator user credentials to access all features.
The list of allowed IP addresses has a higher priority over the list of denied IP
addresses. An example of how this is implemented would be the following:
1.
In the
Deny IP’s
field enter
192.168.1.1-100
.
2.
In the
Allow IP’s
field enter
192.168.1.22, 192.168.1.33
.
Access to the broadcast will be forbidden for the entire subset of addresses except
for
192.168.1.22, 192.168.1.33
.
The set of users must have a fixed IP address or a range of IP addresses through
which they connect to the internet. Individual computers may have dynamic server-
assigned addresses but as long as they use a gateway with a static address to access
the internet, this feature can be configured
IP authentication is primarily about convenience, rather than extra security. The
level of security is comparable with that of a password-based authentication. Bear in
mind that anyone who has access to a computer within the specified range will be
able to access the broadcast without having to provide log in credentials. Also it is
probably not possible to restrict access to a single computer since in most networks
a number of computers share a single gateway to the internet.
The table below shows the fields used in configuring IP-based Authentication for
Viewers.