When the TCP/IP connection has been verified, you are ready to enable server-side support for the Remote Viewer.
To set up remote viewing
If you specify IP names or IP addresses in the Trusted Remote Host Name list, CA AP Remote Manager server will accept connections from only those workstations that you specify in the list. If you do not specify anything in the Trusted Remote Host Names list, CA AP Remote Manager server will accept connections from any IP connection.
IP names in the Trusted Remote Host Names list are compared to the resolved IP name of the incoming connection.
You can specify IP name masks to allow pattern matching. For example, an IP name mask of APLAB* matches any IP host name beginning with the characters APLAB. An IP name mask of *.mylan.com matches any incoming host name within the mylan domain.
You can enter IPv4 or IPv6 addresses in the Trusted Remote Host Names list, keeping the following in mind:
Explicitly specified addresses match only the exactly matching IP address.
For example, 172.24.51.6 allows access to connections only from IP address 172.24.51.6.
Explicitly specified addresses match only the exactly matching IPv6 address.
Note: You must enclose IPv6 addresses in square brackets ([ ]).
You can explicitly specify IPv6 subnet mask to allow wildcard matching. IPv6 IP addresses containing a subnet mask are treated as wildcards matching any incoming connection within the subnet range.
For example, the IPv6 address [2001:0db8:85a3:08d3:1:8a2e:370:7344]/32, matches any address in the range 2001:0db8:0000:0000:0000:0000:0000:0000 to 2001:0db8:ffff:ffff:ffff:ffff:ffff:ffff.
7. Choose from the following levels of Remote User Login Security:
Specifies that the user login (ID and password) is not verified. Session-level security is determined by the value set in the Permission Level field for your session.
Specifies that you want to use the Windows security system to enforce user access privileges. The user login is verified on the host machine or domain, if specified. Session-level security is determined by the value set in the Permission Level field for your session. Session-level security by user is optionally determined by mapping session permissions to file permissions.
Copyright © 2012 CA. All rights reserved. |
|