In this section:
The Trusted Hosts page defines a list of hosts or networks that are able to access the system using management protocols. These management protocols are configured using the settings on the Basic WAN Firewall Settings page. Choose Security from the Configuration Menu and refer to Configure Basic WAN Firewall Settings.
Before you Begin
- Once a trusted address is defined, only hosts in the trusted list are allowed to access the system. Before proceeding, verify that the firewall settings are configured to allow the desired management protocols. Click the Firewallpage link provided or choose Security from the Configuration Menu and refer to Configure Basic WAN Firewall Settings.
- Make sure to add the IP address of this system (the system running your configuration GUI) to the list of trusted hosts.
Adding a Host or Network
This section outlines how to add a host or network.
To add a Host or Network
Choose Security > Trusted Hosts.
Configure settings using the information in the following table as a guide. When you have finished configuring settings, click Add to make your changes take effect.
Click Add. A message indicates that service will be temporarily interrupted.
- Click OK to confirm.
Deleting a Trusted Host
This section outlines how to delete a trusted host.
To Delete a Trusted Host
Choose Security > Trusted Hosts.
In the Trusted Hosts list select checkboxes for the entries that you want to delete. Click All to choose all the entries or None to clear your selections.
Click Delete.
Click OK to confirm.