Security Login. Advantech EKI-7706E-2F, EKI-7706E-2FI, EKI-7706G-2F, EKI-7706G-2FI

Add to My manuals
173 Pages

advertisement

Security Login. Advantech EKI-7706E-2F, EKI-7706E-2FI, EKI-7706G-2F, EKI-7706G-2FI | Manualzz

4.7.7.2

Entry Settings

Once the Global Setting is enabled, use the Entry Settings to define an IP Security entry.

To access this page, click Security > IP Security > Entry Settings .

Figure 4.76 Security > IP Security > Entry Settings

The following table describes the items in the previous figure.

Item

IP Address

IP Mask

Services

Apply

Description

Enter the source IP address to apply the IP Security function.

Enter the IP address for use in masking the previous IP Address.

Enter the type of services to associate with the entry setting.

Click Apply to save the values and update the screen.

The ensuing table for IP Security Entry Information settings are informational only:

IP Address, IP Mask, Services and Action.

4.7.8

Security Login

4.7.8.1

Global Settings

This function provides a means to enable or disable the global security settings for the system.

To access this page, click Security > Security Login > Global Settings .

Figure 4.77 Security > Security Login > Global Settings > Global Settings

The following table describes the items in the previous figure.

Item

State

Apply

Description

Click Enabled or Disabled to set up security login global setting status.

Click Apply to save the values and update the screen.

87 EKI-7706 Series User Manual

Figure 4.78 Security > Security Login > Global Settings > RADIUS Settings

The following table describes the items in the previous figure.

Item

Server IP

Server Port

Security Key

Apply

Description

Enter the IP address of the local server providing authentication function.

Enter the port number (1 to 65535) assigned to the listed Server IP.

Enter the variable to define the network security key used in authentication.

Click Apply to save the values and update the screen.

Figure 4.79 Security > Security Login > Global Settings > TACACS Settings

The following table describes the items in the previous figure.

Item

Server IP

Server Port

Security Key

Description

Enter the IP address of the local server providing authentication function.

Enter the port number (1 to 65535) assigned to the listed Server IP.

Enter the variable to define the network security key used in authentication.

Click Apply to save the values and update the screen.

Apply

The ensuing table for Global Information settings are informational only: State,

RADIUS Server IP, RADIUS Server Port, RADIUS Security Key, TACACS Server IP,

TACACS Server Port and TACACS Security Key.

EKI-7706 Series User Manual 88

4.7.8.2

Access Control Settings

This function specifies the login authentication type for the system.

To access this page, click Security > Security Login > Security Login Access

Control Settings .

Figure 4.80 Security > Security Login > Access Control Settings > Security

Login Type Settings

The following table describes the items in the previous figure.

Item

Login Type

Apply

Description

Click to select the login type. Options include: None Used, RADIUS

Only, TACACS Only, RADIUS & TACACS or RADIUS & TACACS &

WEB.

Click Apply to save the values and update the screen.

Figure 4.81 Security > Security Login > Access Control Settings > Security

Login Type Settings

The following table describes the items in the previous figure.

Item

HTTP

TELNET

SSH

Apply

Description

Click Enabled or Disabled to set up HTTP.

Click Enabled or Disabled to set up HTTPS.

Click Enabled or Disabled to set up SSH.

Click Apply to save the values and update the screen.

The ensuing table for Access Control Information settings are informational only:

Login Type, HTTP, TELNET and SSH.

89 EKI-7706 Series User Manual

advertisement

Related manuals

Download PDF

advertisement

Table of contents