User's Guide (1.0a)
AOC-SIMBL Add-on Card User’s Manual
3-34
3 KVM Encryption
These options allow you to configure the encryption of the RFB
protocol. RFB is used by the remote host to transmit video data
displayed in the host monitor to the local administrator machine, and
transmits keyboard and mouse data from the local administrator
machine back to the remote host. The options are as follows:
• If set to O
FF, no encryption is used.
• If set to T
RY, the applet (-JVM of the remote host) attempts to
make an encrypted connection, and when a connection cannot
be established an unencrypted connection is used.
• If set to F
ORCE, the applet makes an encrypted connection, with
an error reported if no connection is made.
4 IP Access Control This section allows you to configure IP Access Control settings.
5
Enable IP Access
Control
This check box allows you to enable IP Access Control. This function
is used to limit user access to the network by identifying them by their
IP addresses.
NOTE: This function is available to the LAN interface only.
6 Default Policy
When IP Access Control is ENABLED, you can select either ACCEPT or
D
ROP, allowing access or denying access according to pre-defined
rules.
NOTE: If this option is set to D
ROP, and you do not have a set of
rules that will accept the internet connection, then the internet
connection over LAN is impossible. In this case, you need to change
your security settings via modem or by disabling the IP Access
Control.
7 Rule#
Enter a rule number in the box for a command (or commands) that
are used by the IP Access Control.
8 IP/Mask
Enter the IP Address or an IP Address Range for which the
command(s) will be applied.
9Policy
This item instructs the IPMI what to do with the matching packages.
NOTE: The sequence or the order of the rules is important. The rules
are checked in the ascending order until a rule matches. All rules
below the matching one will be ignored. The default policy applies if
no matching rules are found.
10 Append Button
Click this button to add IP Address/Mask, rules or commands to the
existing ones.
11 Insert Button
Click this button to insert IP Address/Mask, rules or commands to the
existing ones.
12 Replace Button
Click this button to replace an old IP Address/Mask, rule or command
with a new one.
13 Delete Button
Click this button to delete (a part of) an existing IP Address/Mask,
rule or command.
14 User Blocking
This section allows you to set the conditions for how a user is
blocked.
Table 3-20. Security Screen Controls (Continued)
Item Name Description










