The Custom Security Profile opens up a dialog box to allow custom configuration of individual protocols and services.Caution: By default a number of protocols and services are enabled in the Custom Security Profile, however, the security protocols and services are user configurable for site specific requirements. Take the required precautions to understand the potential impacts of each individual service configured under Custom Security Profile.The following table show the available protocols and services under the Custom Security Profile.
•
•
• SSH port 22
•
•
•
•
•
•
•
• Note: The following procedure assumes you have installed a new KVM at your site, or you have reset the unit to factory default.
1. Note: Your browser’s pop-up blocker should be disabled for the above dialog box to appear.
4. Select a pre-defined Security Profile by pressing one of the “Secured”, “Moderate”, “Open”, or “Default” profiles, or create a “Custom” profile.Caution: Take the required precautions to understand the potential impacts of each individual service configured under the "Custom" profile.Refer to Enabled Protocols and Services under each Security Profile for a comparison of the available services in each security profile. Refer to the Glossary for a definition of the available services.Note: It is not possible to continue working in the WMI without selecting a Security Profile. The following dialog box appears if you try to navigate to other sections of the WMI.
5. Once you select a security profile or configure a custom profile and apply the changes, the KVM WMI restarts in order for the changes to take effect.