In this section:

The Trusted Hosts page defines a list of hosts or networks that are able to access the system using management protocols. These management protocols are configured using the settings on the Basic WAN Firewall Settings page. Choose Security from the Configuration Menu and refer to Configure Basic WAN Firewall Settings.

Before you Begin

  1. Once a trusted address is defined, only hosts in the trusted list are allowed to access the system. Before proceeding, verify that the firewall settings are configured to allow the desired management protocols. Click the Firewallpage link provided or choose Security from the Configuration Menu and refer to Configure Basic WAN Firewall Settings.
  2. Make sure to add the IP address of this system (the system running your configuration GUI) to the list of trusted hosts.

Adding a Host or Network

This section outlines how to add a host or network.

To add a Host or Network

  1. Choose Security > Trusted Hosts.

  2. Configure settings using the information in the following table as a guide. When you have finished configuring settings, click Add to make your changes take effect.

    Trusted Hosts Configuration Parameters

    ItemDescription

    Add a Host or Network

    IP/Network Address

    Enter the IP address or network address of the subnet to be managed.

    NetmaskEnter the netmask to apply to the IP/Network Address. The netmask determines how many addresses are available in the network.

    Trusted Hosts

    Lists addresses and networks to which basic firewall settings have been applied.

  3. Click Add. A message indicates that service will be temporarily interrupted.

  4. Click OK to confirm.

Deleting a Trusted Host

This section outlines how to delete a trusted host.

To Delete a Trusted Host

  1. Choose Security > Trusted Hosts.

  2. In the Trusted Hosts list select checkboxes for the entries that you want to delete. Click All to choose all the entries or None to clear your selections.

  3. Click Delete.

  4. Click OK to confirm.