When the TCP/IP connection has been verified, you are ready to enable server-side support for the Remote Viewer.
To set up remote viewing
If you specify IP names or IP addresses in the Trusted Remote Host Name list, CA AP Remote Manager server will accept connections from only those workstations that you specify in the list. If you do not specify anything in the Trusted Remote Host Names list, CA AP Remote Manager server will accept connections from any IP connection.
IP names in the Trusted Remote Host Names list are compared to the resolved IP name of the incoming connection.
You can specify IP name masks to allow pattern matching. For example, an IP name mask of APLAB* matches any IP host name beginning with the characters APLAB. An IP name mask of *.mylan.com matches any incoming host name within the mylan domain.
You can enter IPv4 or IPv6 addresses in the Trusted Remote Host Names list, keeping the following in mind:
Explicitly specified addresses match only the exactly matching IP address.
For example, 172.24.51.6 allows access to connections only from IP address 172.24.51.6.
For example, 172.24.51.0 matches 172.24.51.1 to 172.24.51.255. A mask value of 0.0.0.0 matches any address; therefore, access is not restricted by host name or IP address.
Explicitly specified addresses match only the exactly matching IPv6 address.
Note: You must enclose IPv6 addresses in square brackets ([ ]).
For example, the mask value [2001:0db8:85a3:08d3:1:8a2e:370:7344] matches (and thereby allows access) to an incoming connection only from the IPv6 address 2001:0db8:85a3:08d3:1:8a2e:370:7344.
For example, the IPv6 address [2001:0db8:85a3:08d3:1:8a2e:370:7344]/32, matches any address in the range 2001:0db8:0000:0000:0000:0000:0000:0000 to 2001:0db8:ffff:ffff:ffff:ffff:ffff:ffff.
Specifies that the user login (ID and password) is not verified. Session-level security is determined by the value set in the Permission Level field for your session.
Specifies that you want to use the Windows security system to enforce user access privileges. The user login is verified on the host machine or domain, if specified. Session-level security is determined by the value set in the Permission Level field for your session. Session-level security by user is optionally determined by mapping session permissions to file permissions.
|
Copyright © 2012 CA Technologies.
All rights reserved.
|
|