The Custom Security Profile opens up a dialog box to allow custom configuration of individual protocols and services.Caution: By default a number of protocols and services are enabled in the Custom Security Profile, however, the security protocols and services are user configurable for site specific requirements. Take the required precautions to understand the potential impacts of each individual service configured under Custom Security Profile.The following table show the available protocols and services under the Custom Security Profile.
•
•
• SSH port 22allow Direct Access to KVM Ports
•
•
•
•
•
•
•
• Note: The following procedure assumes you have installed a new KVM/net at your site, or you have reset the unit to factory default.
1. Enter the assigned IP address of the KVM/net in your browser and login as an administrator.Note: Your browser’s pop-up blocker should be disabled for the above dialog box to appear.
4. Select a pre-defined Security Profile by pressing one of the “Secured”, “Moderate”, “Open”, or “Default” profiles, or create a “Custom” profile.Caution: Take the required precautions to understand the potential impacts of each individual service configured under the "Custom" profile.Refer to Enabled Protocols and Services under each Security Profile for a comparison of the available services in each security profile. Refer to the Glossary for a definition of the available services.Note: It is not possible to continue working in the WMI without selecting a Security Profile. The following dialog box appears if you try to navigate to other sections of the WMI.
5. Once you select a security profile or configure a custom profile and apply the changes, the KVM/net WMI restarts in order for the changes to take effect.