![background image](http://html1.mh-extra.com/html/zyxel-communications/centralized-network-management-vantage-cnm/centralized-network-management-vantage-cnm_user-manual_944723205.webp)
Chapter 7 Device Advanced Settings
Vantage CNM User’s Guide
205
Secure Client IP
Address
A secure client is a “trusted” computer that is allowed to communicate with the
device using this service.
Select
All
to allow any computer to access the device using this service.
Choose
Selected
to just allow the computer with the IP address that you specify to
access the device using this service.
HTTP
Server Port
You may change the server port number for a service if needed, however you must
use the same port number in order to use that service for remote management.
Server Access
Select the interface(s) through which a computer may access the device using this
service.
Secure Client IP
Address
A secure client is a “trusted” computer that is allowed to communicate with the
device using this service.
Select
All
to allow any computer to access the device using this service.
Choose
Selected
to just allow the computer with the IP address that you specify to
access the device using this service.
SSH
Server Host Key
Select the certificate whose corresponding private key is to be used to identify the
device for SSH connections. You must have certificates already configured in the
My Certificates
screen.
Server Port
You may change the server port number for a service if needed, however you must
use the same port number in order to use that service for remote management.
Server Access
Select the interface(s) through which a computer may access the device using this
service.
Secure Client IP
Address
A secure client is a “trusted” computer that is allowed to communicate with the
device using this service.
Select
All
to allow any computer to access the device using this service.
Choose
Selected
to just allow the computer with the IP address that you specify to
access the device using this service.
TELNET
Server Port
You may change the server port number for a service if needed, however you must
use the same port number in order to use that service for remote management.
Server Access
Select the interface(s) through which a computer may access the device using this
service.
Secure Client IP
Address
A secure client is a “trusted” computer that is allowed to communicate with the
device using this service.
Select
All
to allow any computer to access the device using this service.
Choose
Selected
to just allow the computer with the IP address that you specify to
access the device using this service.
FTP
Server Port
You may change the server port number for a service if needed, however you must
use the same port number in order to use that service for remote management.
Server Access
Select the interface(s) through which a computer may access the device using this
service.
Secure Client IP
Address
A secure client is a “trusted” computer that is allowed to communicate with the
device using this service.
Select
All
to allow any computer to access the device using this service.
Choose
Selected
to just allow the computer with the IP address that you specify to
access the device using this service.
Table 91
Device Operation > Device Configuration > Advanced > Remote Management
LABEL
DESCRIPTION
Summary of Contents for Centralized Network Management Vantage CNM
Page 2: ......
Page 24: ...Vantage CNM User s Guide 24...
Page 30: ...Vantage CNM User s Guide 30...
Page 33: ...33 PART I Introduction Introducing Vantage CNM 31 GUI Introduction 35...
Page 34: ...34...
Page 52: ...52...
Page 58: ...Chapter 4 Device General Settings Vantage CNM User s Guide 58...
Page 108: ...Chapter 5 Device Network Settings Vantage CNM User s Guide 108...
Page 184: ...Chapter 6 Device Security Settings Vantage CNM User s Guide 184...
Page 207: ...Chapter 7 Device Advanced Settings Vantage CNM User s Guide 207...
Page 208: ...Chapter 7 Device Advanced Settings Vantage CNM User s Guide 208...
Page 210: ...Chapter 8 Device Log Vantage CNM User s Guide 210...
Page 234: ...Chapter 9 Device Configuration Management Vantage CNM User s Guide 234...
Page 248: ...248...
Page 264: ...Chapter 14 VPN Monitor Vantage CNM User s Guide 264...
Page 265: ...265 PART IV Monitor Device Status Monitor 267 Device HA Status Monitor 269 Device Alarm 271...
Page 266: ...266...
Page 276: ...Chapter 17 Device Alarm Vantage CNM User s Guide 276...
Page 277: ...277 PART V Log Report Device Operation Report 279 CNM Logs 291 VRPT 293...
Page 278: ...278...
Page 296: ...Chapter 20 VRPT Vantage CNM User s Guide 296...
Page 298: ...298...
Page 312: ...Chapter 21 CNM System Setting Vantage CNM User s Guide 312...
Page 318: ...Chapter 24 Vantage CNM Software Upgrade Vantage CNM User s Guide 318...
Page 322: ...Chapter 26 About Vantage CNM Vantage CNM User s Guide 322...
Page 323: ...323 PART VII Account Management Group 325 Account 329...
Page 324: ...324...
Page 328: ...Chapter 27 Group Vantage CNM User s Guide 328...
Page 332: ...Chapter 28 Account Vantage CNM User s Guide 332...
Page 333: ...333 PART VIII Troubleshooting Troubleshooting 335...
Page 334: ...334...
Page 338: ...Chapter 29 Troubleshooting Vantage CNM User s Guide 338...
Page 340: ...340...
Page 378: ...Appendix E IP Address Assignment Conflicts Vantage CNM User s Guide 378...
Page 382: ...Appendix F Common Services Vantage CNM User s Guide 382...
Page 416: ...Appendix H Open Software Announcements Vantage CNM User s Guide 416...
Page 424: ...Appendix J Customer Support Vantage CNM User s Guide 424...
Page 428: ...Index Vantage CNM User s Guide 428...
Page 429: ...Index Vantage CNM User s Guide 429...
Page 430: ...Index Vantage CNM User s Guide 430...