AMX Signature Series NetLinx Integrated Controller NI-3101-SIG User Manual

Page 51

Advertising
background image

NetLinx Security within the Web Server

41

NI-3101-SIG Signature Series NetLinx Integrated Controller



The following graphic illustrates the Ports which can be enabled for the validation of rights by
using a valid username and password. When one of the above options is enabled, the Master then
requires the entry of a valid username and password to validate rights for that action and then grant
or deny access.

System Level Security Page (Cont.)

Feature

Description

Telnet Access:

This selection determines if a username and password is
required for Telnet Access (see FIG. 37).
• If Telnet access is enabled, a username and password is

required before allowing communication over either the Telnet
and/or SSH Ports. SSH version 2 is only supported.

• This authorized user must have sufficient access rights to login

through a Telnet session to the Master.

• To establish a secure Telnet connection, an administrator can

decide to disable the Telnet Port and then enable the SSH
Port. Refer to theSetting the Master’s Port
Configurations
section on page 61.

Configuration (security):

This selection determines if a username and password is
required before allowing a group/user to alter the current
Master’s security configuration and communication settings (see
FIG. 37).
• Configuration access provides the user with the ability to

perform configuration functions on the NetLinx system through
NetLinx Studio. This includes such things as: IP
configuration/Reset, URL list settings, Master
communication settings, and security parameters
.

• If security Configuration is enabled, a user/group must have

sufficient access rights to access the Main Security Menu.

• Any time a configuration operation is performed, the Master

verifies the current access rights for that feature and then
requires a valid username and password
(if not already logged in).
- An example would be if you are trying to add a New User or
modify the rights of an existing Group.

ICSP Connectivity:

This selection determines if a username and password is
required prior to communication with a target NetLinx Master via
an ICSP connection using any transport method (TCP/IP, UDP/
IP, and RS-232) (see FIG. 37).
• If this access is enabled and the user is not logged-in, when

the user attempts to connect, the authentication fails and
displays an “Access not allowed” message.

• This feature allows communication amongst various AMX

hardware and software components. This feature works in
tandem with the Require Encryption option to require that any
application or hardware communicating with the Master must
provide a valid username and password.

• Refer to theICSP Authentication section below for more

detailed information.

Require Encryption:

Requires that any data being transmitted or received via an
ICSP connection (among the various AMX products) be
encrypted and that any application or hardware communicating
with the Master over ICSP must provide a valid username and
password.

Advertising