beautypg.com

Grant access – HP Remote Device Access Software User Manual

Page 34

background image

The Permitted Tunnels screen contains the following columns:

Access Control

Description

User

Displays the name of the user to be granted access. Any displays when all
users are allowed access.

Target

Displays the name of the host to which access is to be granted. Any displays
when a user can access any system within the customer's network.

Port

Displays the name of the port on the target to which access is to be granted.
Any displays when a user can access all ports on the target.

Proto

Displays the protocol the user has been granted access to. This can be one of
TCP/UDP/ANY. ANY displays when TCP and UDP traffic is allowed.

Action

Click

to edit a field. Click

to delete the value in the field.

Note: When you click

or

, the Grant Access dialog box

appears with the fields pre-populated with the current values.

Table 4.6 Permitted Tunnels

Note: If there are no access control entries, then No entries defined at this table displays in
the table.

To add new values to the Permitted Tunnels table, click Add Whitelist Entry. The Grant Access dialog
box appears. For more information about the Grant Access dialog box, see

"Grant Access" below

".

Grant Access

The Grant Access Dialog box allows you to add or modify information entered in the Permitted Tunnels
table.

Figure 4.6 Grant Access dialog box

The Grant Access dialog box contains the following fields:

HP Remote Device Access 8.1: vCAS User Guide

Page 34 of 65

Chapter 4: Managing your vCAS