
The Permitted Tunnels screen contains the following columns:
Access Control Description
User Displays the name of the user to be granted access. Any displays when all
users are allowed access.
Target Displays the name of the host to which access is to be granted. Any displays
when a user can access any system within the customer's network.
Port Displays the name of the port on the target to which access is to be granted.
Any displays when a user can access all ports on the target.
Proto Displays the protocol the user has been granted access to. This can be one of
TCP/UDP/ANY. ANY displays when TCP and UDP traffic is allowed.
Action
Click to edit a field. Click to delete the value in the field.
Note: When you click or , the Grant Access dialog box
appears with the fields pre-populated with the current values.
Table 4.6 Permitted Tunnels
Note: If there are no access control entries, then No entries defined at this table displays in
the table.
To add new values to the Permitted Tunnels table, click Add Whitelist Entry. The Grant Access dialog
box appears. For more information about the Grant Access dialog box, see "Grant Access" below".
Grant Access
The Grant Access Dialog box allows you to add or modify information entered in the Permitted Tunnels
table.
Figure 4.6 Grant Access dialog box
The Grant Access dialog box contains the following fields:
HP Remote Device Access 8.1:vCAS User Guide Page 34 of 65
Chapter 4: Managing your vCAS
Komentarze do niniejszej Instrukcji