beautypg.com

Other configuration items, User names & passwords, Access lists – Comtech EF Data CiM Quick-Start Guide User Manual

Page 21: 9 other configuration items, 1 user names & passwords 1.9.2 access lists

background image

CiM Quick Start Guide

Rev. 1

Operation

CD/CIMQSTART.IOM

11

1.9 O

THER

C

ONFIGURATION

I

TEMS

1.9.1 U

SER

N

AMES

& P

ASSWORDS

Step Description

1

From the Main Menu select Administration sub-menu.

2

Select Name/Password Configuration sub-menu.

1.9.2 A

CCESS

L

ISTS

Access lists can be used to regulate access to CiM to one or more devices or networks. If
access list enforcement is enabled, only devices with IP address within the configured
range are allowed access with:

ICMP ping

Telnet

FTP

SNMP

HTML

If enabled, access list restrictions apply to both Ethernet and HDLC interface.

1.9.2.1 C

I

M 1 C

ONFIGURATION

Step Description

1

From the Main Menu select Administration sub-menu.

2

Select Access Lists sub-menu

3

Set AccessClient1

a

Set IP Address to 172.16.10.0

b

Set Number of subnet bits to 24

c

Set Access List Enforcement to Enabled

Now CiM 1 can only be pinged from PC 1 (and any other device on network
172.16.10.0/24) or accessed via Telnet or FTP or web interface. PC 2 will not be able to
ping CiM 1 or access via any other means. To allow PC 2 access to CiM 1: