beautypg.com

Chapter 4: icas configuration, Configure proxy servers, Access logs – HP Remote Device Access Software User Manual

Page 13

background image

Chapter 4: iCAS Configuration

The customer can restrict and control HP's use of iCAS to only designated systems to meet security
needs by clicking the Access Control tab.

Figure 4.1 Access Control Tab

Configure Proxy Servers

We use the HTTP Connect method to jump through the proxy server, requesting port 80. Many proxy
servers are configured by default to forbid a CONNECT to port 80. The iCAS will return a "403 Forbidden"
error from the proxy. Change the proxy configuration to allow this CONNECT to port 80. For example, in
the Squid proxy, add port 80 to the Safe_ports ACL. In tinyproxy, add "ConnectPort 80" to the
configuration.

Access Logs

Customers can monitor HP's use of iCAS to see which systems HP accesses. Logs can also be used to
troubleshoot iCAS connection problems. Click the Log tab to view log records and events.

Page 13 of 15

HP Remote Device Access 8.1: iCAS User Guide