Systemlog lifetime or disk size limit usage option, Ftp server passive mode parameter, Source ips access restriction to management – Panasonic 7 User Manual

Page 24: Ssh server configurations

Attention! The text in this document has been recognized automatically. To view the original document, you can use the "Original mode".

Advertising
background image

24 New in this release

Systemlog lifetime or disk size limit usage option

VPN Router allows you to choose between setting a log file disk size limit or a log
file lifetime for the Systemlog. Previous versions of the VPN Router only allowed

the Systemlog to have a lifetime specified (default 60 days).

For more information about the Systemlog lifetime and disk size limit option, see

Step 5 in “Configuring system settings” on page 108.

FTP server passive mode parameter

There is a new check box called disk size limitfound in System > Settings in the
Router Settings section.

By enabling this parameter, you allow passive FTP connections to connect to the
unit, perform directory listings, and upload and download files. If this check box

is not enabled, you can still use passive FTP connections to connect to the unit, but

you cannot perform directory listings or upload and download files.

For more information about the FTP server passive mode parameter, see Step 7 in

“Configuring system settings” on page 108.

Source IPs access restriction to management

This release enables an administrator to have more control over management

services by restricting source IPs connections for management purposes through

Access Lists (ACL). For more information about Source IPs access restriction to

management, see “Restricting source IPs access to management” on page 44.

SSH server configurations

You can now enable an SSH server to allow secure CLI sessions, such as telnet, to
the NVR. You can enable the private and public interface filters, set the port for
the SSH server, and restart the server. You can use either the NVR GUI or CLI to

configure the SSH server. For more information about SSH server configurations,

see “Using the SSH server to allow secure sessions” on page 112.

NN46110-500

Advertising