SNMP/HTTP Access Control User Manual



Similar documents
VLSM and CIDR Malin Bornhager Halmstad University

IP Subnetting and Addressing

Computer Network Foundation. Chun-Jen (James) Chung. Arizona State University

CE363 Data Communications & Networking. Chapter 6 Network Layer: Logical Addressing


Tutorial (03) IP addresses & Sub netting

Lab#2: IP Addressing and Subnetting

Chapter 19 Network Layer: Logical Addressing 19.1

APPENDIX B. Routers route based on the network number. The router that delivers the data packet to the correct destination host uses the host ID.

TCP/IP Basis. OSI Model

How To Make A Network Address Prefix Smaller

Classful IP Addressing (cont.)

Chapter 3 Using Access Control Lists (ACLs)

1. How many unique network IDs are there in class A addresses? # of unique hosts?

CONFIGURING TCP/IP ADDRESSING AND SECURITY

VLSM Static routing. Computer networks. Seminar 5

Table of Contents. Cisco IP Addressing and Subnetting for New Users

The Subnet Training Guide

Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP

ICS 351: Today's plan

Computer Networks By Bahaa Q. Al-Mussawi Subnetting Basics Reduced network traffic Optimized network performance Simplified management

Subnetting/Supernetting and Classless Addressing

Classful Subnetting Explained

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet

Internet Addresses (You should read Chapter 4 in Forouzan)

IP Addressing A Simplified Tutorial

Getting Started with Clearlogin A Guide for Administrators V1.01

IP Addressing and Subnetting for New Users

Brocade to Cisco Comparisons

Network layer: Overview. Network layer functions IP Routing and forwarding

IP Networking Part 3- IP Address Management A webinar to help you prepare for the CBNE Certification

CompTIA Exam N CompTIA Network+ certification Version: 5.1 [ Total Questions: 1146 ]

Expert Reference Series of White Papers. Binary and IP Address Basics of Subnetting

Future Internet Technologies

PART IV. Network Layer

CCNA R&S: Introduction to Networks. Chapter 9: Subnetting IP Networks

Guide to TCP/IP, Third Edition. Chapter 2: IP Addressing and Related Topics

Advanced IP Addressing

(Refer Slide Time: 02:17)

Number of bits needed to address hosts 8

CCNA Tutorial Series SUBNETTING

WHITE PAPER. Understanding IP Addressing: Everything You Ever Wanted To Know

IP Addressing. -Internetworking (with TCP/IP) -Classful addressing -Subnetting and Supernetting -Classless addressing

Internetworking and IP Address

Computer Networks. Lecture 3: IP Protocol. Marcin Bieńkowski. Institute of Computer Science University of Wrocław

2.3 IPv4 Address Subnetting Part 2

Firewall VPN Router. Quick Installation Guide M73-APO09-380

Internetworking With TCP/IP

SUBNETS, CIDR, AND CLASSLESS ADDRESSING

IP Filter/Firewall Setup

Pre-lab Preparation: 1. Read thoroughly and prepare the experiment sheet. 2. You must bring a printed copy of this experiment with you to the lab.

Subnetting IPv4 and IPv6

IP addressing. Interface: Connection between host, router and physical link. IP address: 32-bit identifier for host, router interface

A typical router setup between WebSAMS and ITEd network is shown below for reference. DSU. Router

SNMP-1 Configuration Guide

How to Create Subnets To create subnetworks, you take bits from the host portion of the IP address and reserve them to define the subnet address.

Classless Subnetting Explained

IT:101 Cisco Networking Academy I Subnetting

Subnetting Study Guide

EXPLORER. TFT Filter CONFIGURATION

Module 10 Subnetting Class A, B and C addresses. Solutions to the Lab Exercises a, b, c and d

Subnet + CIDR. Internet Networking recitation #1. 11: , Internet Networking,

Sybex CCENT Chapter 4: Easy Subnetting. Instructor & Todd Lammle

IP Addressing. IP Addresses. Introductory material.

CA Nimsoft Monitor Snap

Lecture Computer Networks

This tutorial will help you in understanding IPv4 and its associated terminologies along with appropriate references and examples.

EMG Ethernet Modbus Gateway User Manual

Configuring the Firewall Management Interface

Type of addressing in IPv4

Environmental Monitoring Unit

Variable length subnetting

Implementing Network Address Translation and Port Redirection in epipe

Technical Support Information

This chapter describes how to set up and manage VPN service in Mac OS X Server.

Introduction. Internet Address Depletion and CIDR. Introduction. Introduction

Lab 2 - Basic Router Configuration

Chapter 6 Configuring IP

Network Management Card. User Manual

TCP/IP Drill Pack. By Donna Warren. Created by Donna P. Warren Revised: 1/2/2012 Page 1 of 19

Scaling the Network: Subnetting and Other Protocols. Networking CS 3470, Section 1

Network and Host Addresses , Cisco Systems, Inc. All rights reserved. INTRO v1.0a 6-4

8.2 The Internet Protocol

Chapter 3: Review of Important Networking Concepts. Magda El Zarki Dept. of CS UC Irvine

Multi-Homing Dual WAN Firewall Router

You can probably work with decimal. binary numbers needed by the. Working with binary numbers is time- consuming & error-prone.

NMS300 Network Management System

How to setup Mobility Extension on the 2N OfficeRoute and 2N VoiceBlue Enterprise

Table of Contents. Configuring IP Access Lists

We Are HERE! Subne\ng

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

IP Subnetting and Related Topics A Tutorial by Chris Uriarte <chrisjur@cju.com> Updated April 2001

Chapter 5. IPv4 Addresses. TCP/IP Protocol Suite 1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

Chapter 5: Sample Questions, Problems and Solutions Bölüm 5: Örnek Sorular, Problemler ve Çözümleri Örnek Sorular (Sample Questions):

TCP/IP Cheat Sheet. A Free Study Guide by Boson Software, LLC

IP address format: Dotted decimal notation:

Ethernet and IP A slightly less introductory networking class. Drew Saunders Networking Systems Stanford University

Configuring SNMP and using the NetFlow MIB to Monitor NetFlow Data

Transcription:

SNMP/HTTP Access Control User Manual

1. Security Control Configuration... 3 1.1. HTTP Security... 3 1.1.1. HTTP Security disabled... 3 1.1.2. HTTP Security enabled... 4 1.1.3. HTTP Security Control... 5 1.2. IP Firewall Table... 7 1.2.1. NMS IP Address... 7 1.2.2. Community... 9 1.2.3. Access Type... 9 1.3. Reset Access Control Table... 11 2. How to filter... 12 2.1. Host... 12 2.2. Network segment... 13 2.3. Allow one IP address to login in segment... 14 Appendix A Behavior flow chart... 15 Appendix B What is IP/CIDR... 17

1. Security Control Configuration 1.1. HTTP Security 1.1.1. HTTP Security disabled Default is HTTP security disabled. When HTTP security is disabled, the login windows would not popup immediately. Host can connect to USHA directly. If you set access type is Not Access and HTTP security is disabled, host still can access to USHA via HTTP.

1.1.2. HTTP Security enabled If HTTP security is enabled, will popup login windows immediately when host connect to USHA. We suggest make HTTP security is enabled and configuration access control function, and then you can have higher security.

1.1.3. HTTP Security Control 1. Launch hyper-terminal or telnet connect to USHA, then enter password. 2. Go to USHA Configuration. 3. Go to Control Group.

4. Go to HTTP Control. 5. Set HTTP Security Control is enabled.

1.2. IP Firewall Table 1.2.1. NMS IP Address This field used to set an IP address or a network segment. You can management this IP or segment according to access type. 1.2.1.1. USHA 5.x In USHA 5.x, this field only can set IPv4 address. If you want to set a network segment, you can set 10.1.7.255 that mean the client with the IP address within the range from 10.1.7.0 to 10.1.7.255.

1.2.1.2. USHA 6.x In USHA 6.x, this field can set IPv4 and IPv6 address. If you want to set a network segment, you can set 10.1.7.0/24 that mean the client with the IP address within the range from 10.1.7.0 to 10.1.7.255. If used IPv6, you can set 2001:db8::/48 that mean the client with the IP address within the range from 2001:db8:0:0:0:0:0:0 to 2001:db8:0:ffff:ffff:ffff:ffff:ffff.

1.2.2. Community This field used to define a password. When used this password login, host will according access type connect to USHA web page. This field default value is public. If you do not set community and access type set Not Access or Read only, this host will not be able to login. If you can t login due to this situation, you can use telnet or hyper-terminal to reset this item. 1.2.3. Access Type This field used to define this IP address access type. There have Not Access, Read Only and Read/Write three types. 1.2.3.1. Not Access When access type is Not Access and HTTP Security Control is enabled, host would not access web page. When access type is Not Access and HTTP Security Control is disabled, host can access web page but read only. 1.2.3.2. Read Only Host can access web page but read only.

1.2.3.3. Read/Write Host can access web page and configuration all parameter.

1.3. Reset Access Control Table 1. Launch hyper-terminal or telnet connect to USHA, then enter password. 2. Go to Access Control Table. 3. Select Reset, and then entry index number that you want to reset.

2. How to filter According to different configuration, this function can filter one host or a network segment. You also can set different access type at one host. This function will effect for SNMP and HTTP. 2.1. Host If you want to management one host, you can set as below table. You can set two passwords correspond to different access type. If you enter community Read/Write password, you can set and read value; if you enter Community Read-Only password, you just read, but not set value. If you login by read-only password and you want to set value, you need login again and enter read/write password.

2.2. Network segment If you want allow or deny a segment, you can set as below. This setting can allow all IP to login and set value in 10.X.X.X segment, and allow all IP to login in 172.16.X.X segment. All IP in 192.168.1.X will be blocked to login. If you want to set a segment, you can use IP / CIDR format to represent an IPv4 or IPv6 segment. For example, "192.168.0.0/16" IPv4 network addresses range from 192.168.0.0 to 192.168.255.255.

2.3. Allow one IP address to login in segment If you just want allow one IP address to login in segment, you can set as below. This setting can block all IP to login in 10.1.7.X segment, except 10.1.7.51. Segment must setting at the last one. When host try to connect to USHA, system will compare host IP address and the first condition. If the first condition is match, will not to compare the next condition. So, if segment setting at the first index, it will block 10.1.7.51 login in to USHA.

Appendix A Behavior flow chart HTTP Security is enabled

HTTP Security is disabled

Appendix B What is IP/CIDR Classless Inter-Domain Routing (CIDR) is a method for allocating IP addresses and routing Internet Protocol packets. CIDR encompasses several concepts. It is based on the VLSM technique with effective qualities of specifying arbitrary-length prefixes. CIDR notation is syntax of specifying IP addresses and their associated routing prefix. It appends to the address a slash character and the decimal number of leading bits of the routing prefix, e.g., 192.0.2.0/24 for IPv4, and 2001:db8::/32 for IPv6. CIDR blocks An IP address is part of a CIDR block, and is said to match the CIDR prefix if the initial n bits of the address and the CIDR prefix are the same. The length of an IPv4 address is 32 bits, an n-bit CIDR prefix leaves 32-n bits unmatched, meaning that 2 32-n IPv4 addresses match a given n-bit CIDR prefix. For example, the CIDR address 10.1.7.64/26 indicates a block of 64 IP addresses. So, this segment range is 10.1.7.64 to 10.1.7.127. If we want to know 10.1.7.100 and 10.1.7.166 is the same network segment. We can convert the IP to binary. Because prefix-based 26 bits are different, so 10.1.7.100 and 10.1.7.166 are in different block. 10.1.7.64 10.1.7.100 10.1.7.166 00001010 00000001 00000111 01000000 00001010 00000001 00000111 01100100 00001010 00000001 00000111 10100110 26 bit Same block 10.1.7.64/26 Different block 10.1.7.128/26 IPv4 CIDR IP/CIDR Mask IP/CIDR Mask IP/CIDR Mask IP/CIDR Mask a.b.c.d/32 255.255.255.255 a.b.c.0/24 255.255.255.0 a.b.0.0/16 255.255.0.0 a.0.0.0/8 255.0.0.0 a.b.c.d/31 255.255.255.254 a.b.c.0/23 255.255.254.0 a.b.0.0/15 255.254.0.0 a.0.0.0/7 254.0.0.0 a.b.c.d/30 255.255.255.252 a.b.c.0/22 255.255.252.0 a.b.0.0/14 255.252.0.0 a.0.0.0/6 252.0.0.0 a.b.c.d/29 255.255.255.248 a.b.c.0/21 255.255.248.0 a.b.0.0/13 255.248.0.0 a.0.0.0/5 248.0.0.0 a.b.c.d/28 255.255.255.240 a.b.c.0/20 255.255.240.0 a.b.0.0/12 255.240.0.0 a.0.0.0/4 240.0.0.0 a.b.c.d/27 255.255.255.224 a.b.c.0/19 255.255.224.0 a.b.0.0/11 255.224.0.0 a.0.0.0/3 224.0.0.0 a.b.c.d/26 255.255.255.192 a.b.c.0/18 255.255.192.0 a.b.0.0/10 255.192.0.0 a.0.0.0/2 192.0.0.0

a.b.c.d/25 255.255.255.128 a.b.c.0/17 255.255.128.0 a.b.0.0/9 255.128.0.0 a.0.0.0/1 128.0.0.0