Chapter 6: Using the Web Interface
179
Configuring Security Settings
The EMX provides tools to control access. You can enable the internal
firewall, create firewall rules, and set login limitations. In addition, you
can create and install the certificate or set up external authentication
servers for access control. This product supports the SHA-2 certificate.
Tip: To force all HTTP accesses to the EMX to be redirected to HTTPS,
see
Changing HTTP(S) Settings
(on page 171).
Submenu command
Refer to
IP Access Control
Creating IP Access Control Rules
(on page 179)
Role Access Control
Creating Role Access Control Rules
(on page 182)
SSL Certificate
Setting Up an SSL/TLS Certificate
(on page 184)
Authentication
Setting Up External Authentication
(on page 189)
Login Settings
Configuring Login Settings
(on page 198)
Password Policy
Configuring Password Policy
(on page 200)
Service Agreement
Enabling the Restricted Service Agreement
(on page 201)
Creating IP Access Control Rules
IP access control rules (firewall rules) determine whether to accept or
discard traffic to/from the EMX, based on the IP address of the host
sending or receiving the traffic. When creating rules, keep these
principles in mind:
Rule order is important.
When traffic reaches or is sent from the EMX device, the rules are
executed in numerical order. Only the first rule that matches the IP
address determines whether the traffic is accepted or discarded. Any
subsequent rules matching the IP address are ignored.
Subnet mask is required.
When typing the IP address, you must specify BOTH the address and
a subnet mask. For example, to specify a single address in a Class C
network, use this format:
x.x.x.x/24
where
/24 = a subnet mask of 255.255.255.0.
To specify an entire subnet or range of addresses, change the subnet
mask accordingly.
Содержание EMX2-111
Страница 69: ...Chapter 4 Connecting External Equipment Optional 57...
Страница 78: ...Chapter 5 Using the EMX 66 EMX2 888...
Страница 442: ...Appendix A Specifications 430 RS 485 Pin signal definition 6 D bi direction al Data 7 8...
Страница 488: ...Appendix E LDAP Configuration Illustration 476 2 The EMX_Admin role is created...
Страница 507: ...Appendix G RADIUS Configuration Illustration 495 Note If your EMX uses PAP then select PAP...
Страница 508: ...Appendix G RADIUS Configuration Illustration 496 10 Select Standard to the left of the dialog and then click Add...
Страница 509: ...Appendix G RADIUS Configuration Illustration 497 11 Select Filter Id from the list of attributes and click Add...
Страница 512: ...Appendix G RADIUS Configuration Illustration 500 14 The new attribute is added Click OK...
Страница 513: ...Appendix G RADIUS Configuration Illustration 501 15 Click Next to continue...