Other configuration items, User names & passwords, Access lists – Comtech EF Data CiM Quick-Start Guide User Manual
Page 21: 9 other configuration items, 1 user names & passwords 1.9.2 access lists

CiM Quick Start Guide
Rev. 1
Operation
CD/CIMQSTART.IOM
11
1.9 O
THER
C
ONFIGURATION
I
TEMS
1.9.1 U
SER
N
AMES
& P
ASSWORDS
Step Description
1
From the Main Menu select Administration sub-menu.
2
Select Name/Password Configuration sub-menu.
1.9.2 A
CCESS
L
ISTS
Access lists can be used to regulate access to CiM to one or more devices or networks. If
access list enforcement is enabled, only devices with IP address within the configured
range are allowed access with:
ICMP ping
Telnet
FTP
SNMP
HTML
If enabled, access list restrictions apply to both Ethernet and HDLC interface.
1.9.2.1 C
I
M 1 C
ONFIGURATION
Step Description
1
From the Main Menu select Administration sub-menu.
2
Select Access Lists sub-menu
3
Set AccessClient1
a
Set IP Address to 172.16.10.0
b
Set Number of subnet bits to 24
c
Set Access List Enforcement to Enabled
Now CiM 1 can only be pinged from PC 1 (and any other device on network
172.16.10.0/24) or accessed via Telnet or FTP or web interface. PC 2 will not be able to
ping CiM 1 or access via any other means. To allow PC 2 access to CiM 1: