Installation Guide
Chapter 6. Administration of the Telecommuting Module
Network Address
Shows the IP address of the DNS Name Or Network Address you entered in the previous field.
Netmask/Bits
Netmask/Bits is the mask that will be used to specify the configuration computers. See chapter 3 of the User
Manual, for instructions on writing the netmask. To limit access so that only one computer can configure, use the
netmask 255.255.255.255. You can also specify the netmask as a number of bits, which in this case would be 32. To
allow configuration from an entire network, you must enter the network address under Network address, and a
netmask with a lower number here. To allow configuration from several computers or networks, create several lines
for the information.
Range
The Range shows all IP addresses from which the Telecommuting Module can be configured. The range is
calculated from the configuration under DNS name or network address and Netmask/Bits. Check that the correct
information was entered in the DNS name or network address and Netmask/Bits fields.
Log Class
Here, you enter what log class the Telecommuting Module should use to log the configuration traffic to the
Telecommuting Module’s web server. Log classes are defined on the Log Classes page under Logging. See also
chapter 11 of the User Manual.
Log Rule No.
The Log Rule No. field determines the order of the lines. The order is important in deciding what is logged and
warned for. The Telecommuting Module uses the first line that matches the configuration traffic.
Perhaps you want to configure the Telecommuting Module so that configuration traffic from one specific computer
is simply logged while traffic from the rest of that computer’s network is both logged and generates alarms.
The rules are used in the order in which they are listed, so if the network is listed first, all configuration traffic from
that network is both logged and generates alarms, including the traffic from that individual computer. But if the
individual computer is listed on a separate line before the network, that line will be considered first and all
configuration traffic from that computer is only logged while the traffic from the rest of the computer’s network is
both logged and generates alarms.
Delete Row
If you select this box, the row is deleted when you click on Add new rows, Save, or Look up all IP addresses
again.
Create
Enter the number of new rows you want to add to the table, and then click on Create.
Save
Saves the Access Control configuration to the preliminary configuration.
Cancel
Reverts all the above fields to their previous configuration.
Look up all IP addresses again
Looks up the IP addresses for all DNS names on this page in the DNS servers you entered on the Basic
Configuration page.
33