Configuring Data Access - Motorola AP-51 series Product Reference Manual

Hide thumbs Also See for AP-51 series:
Table of Contents

Advertisement

5. Click
Undo Changes
settings displayed on the Adaptive AP Setup screen to the last saved configuration.
6. Click
Logout
confirming the logout before the applet is closed.

4.3 Configuring Data Access

Use the
AP-51XX Access
different subnets (LAN1, LAN2 or WAN) using different protocols such as HTTP, HTTPS, Telnet, SSH
or SNMP. The access options are either enabled or disabled. It is not meant to function as an ACL in
routers or other firewalls, where you can specify and customize specific IPs to access specific
interfaces.
Use the access point's Access screen checkboxes to enable or disable LAN1, LAN2 and/or WAN
access using the protocols and ports listed. If access is disabled, this effectively locks out the
administrator from configuring the access point using that interface. To avoid jeopardizing the
network data managed by the access point, Motorola recommends enabling only those interfaces
used in the routine (daily) management of the network, and disabling all other interfaces until they
are required.
The AP-51XX Access screen also has a facility allowing customers to create a login message with
customer generated text. When enabled (using either the access point Web UI or CLI), the login
message displays when the user is logging into the access point. If the login message is disabled, the
default login screen displays with no message.
With this new 2.1 release of access point firmware, AP access can be restricted to specific IP
addresses. Trusted Host subnet management restricts LAN1, LAN2 and WAN interface access (via
SNMP, HTTP, HTTPS, Telnet and/or SSH) to a set of (up to 8) user defined trusted hosts or subnets.
Only hosts with matching IP addresses can access the access point. Enabling the feature denies
access from any subnet (IP address) not defined as trusted. Once a set of trusted hosts is defined and
applied, the settings can be imported and exported as a part of the access point's configuration
import/export functionality. For information on defining trusted hosts for exclusive AP access, see
Defining Trusted Hosts on page
To configure access for the access point:
1. Select
System Configuration
The
Trusted Hosts
can be viewed by using the scroll bar on the right-hand side of the screen.
(if necessary) to undo any changes made. Undo Changes reverts the
to securely exit the access point Access Point applet. A prompt displays
screen to allow/deny management access to the access point from
4-14.
->
AP-51xx Access
field appears at the top of the screen, but the remainder of the screen
System Configuration
from the menu tree.
4-9

Advertisement

Table of Contents
loading

Table of Contents