Red Hat NETSCAPE MANAGEMENT SYSTEM 7.0 - AGENT GUIDE Guida di Installazione Pagina 30

  • Scaricare
  • Aggiungi ai miei manuali
  • Stampa
  • Pagina
    / 72
  • Indice
  • SEGNALIBRI
  • Valutato. / 5. Basato su recensioni clienti
Vedere la pagina 29
10. Select IP Restricted Login, and click Next. The IP Address to Include dialog box appears.
This dialog box enables you to specify the IP address or IP address ranges to grant login
access permission. If there are IP addresses in the Inclusion list, then only those IP addresses
are enabled for login privileges. If there are no IP addresses in the Inclusion list, then login
privileges are permitted to all IP addresses that are not in the Exclusion list.
Note: A single address and ranges of addresses can be accepted in the IP Restricted Login
dialog box. Enter the single address in the first box.
a. In the Include field, enter a beginning IP address to which you want to grant login
access.
b. In the To field, enter an ending IP address to which you want to grant login access. All
IP addresses that fall between the beginning and ending IP addresses are granted login
access.
c. Click Add. The IP address or IP address range is added to the Inclusion list. To delete
an IP address or IP address range, select an IP address or IP address range, and click
Delete. The IP address or IP address range is deleted from the Inclusion list.
Note: If you enter an invalid IP address or IP address range, an error message appears
indicating the IP address is invalid. Click OK. Enter a valid IP address or IP address
range, and click Add again.
11. Click Next. The IP Address to Exclude dialog box appears.
a. In the Exclude field, enter a beginning IP address to which you want to deny login
access.
b. In the To field, enter an ending IP address to which you want to deny login access. All
IP addresses that fall between the beginning and ending IP addresses are denied login
access.
c. Click Add. The IP address or IP address range is added to the Exclusion list. To delete
an IP address or IP address range, select an IP address or IP address range, and click
Delete. The IP address or IP address range is deleted from the Exclusion list.
Note: If you enter an invalid IP address or IP address range, an error message appears,
indicating the IP address is invalid. Click OK. Enter a valid IP address or IP address
range, and click Add again.
Note: If Next is selected without adding any IP addresses to either the Include or
Exclude lists, a warning message appears stating, IP Restricted Login checkbox
will be marked as disabled. Do you want to proceed without adding
any IP Address restrictions? If you select OK, the IP Restricted Login option
on the IP Restricted Login dialog box is deselected, and the Install Summary dialog
box appears.
12. Click Next. The Install Summar y Panel appears. The Install Summary Panel lists a
summary of the options that you specified during the installation.
13. Click Next. The installation process is started.
Note: During the installation of HP SMH, the Cancel button is disabled. Even if you click
X in the upper-right corner of the box, the current operation cannot be cancelled.
14. Click Finish to complete the installation.
Installing HP SMH for Windows silently
The HP SMH installation for Windows enables you to silently install HP SMH. After the
installation is complete, you can configure HP SMH settings.
30 Installing on Windows
Vedere la pagina 29
1 2 ... 25 26 27 28 29 30 31 32 33 34 35 ... 71 72

Commenti su questo manuale

Nessun commento