User`s manual

H.323 User's Manual 5. Web Management
Version 5.0 55 December 2006
5 Web Management
The Embedded Web Server is used both for gateway configuration, including loading of
configuration files, and for run-time monitoring. The Embedded Web Server can be
accessed from a standard Web browser, such as Microsoft™ Internet Explorer,
Netscape™ Navigator, etc. Specifically, users can employ this facility to set up the gateway
configuration parameters. Users also have the option to remotely reset the gateway and to
permanently apply the new set of parameters.
5.1 Computer Requirements
To use the Embedded Web Server, the following is required:
A computer capable of running your Web browser.
A network connection to the VoIP gateway.
One of the following compatible Web browsers:
Microsoft™ Internet Explorer™ (version 6.0 and higher).
Netscape™ Navigator™ (version 7.2 and higher).
Note: The browser must be Java-script enabled. If java-script is disabled, access
to the Embedded Web Server is denied.
5.2 Protection and Security Mechanisms
Access to the Embedded Web Server is controlled by the following protection and security
mechanisms:
User accounts (refer to Section 5.2.1 below).
Read-only mode (refer to Section 5.2.2 on page 57).
Disabling access (refer to Section 5.2.3 on page 57).
Limiting access to a predefined list of IP addresses (refer to Section 5.6.7.2 on page
163).
Secured HTTP connection (HTTPS) (refer to Section 13.2.1 on page 330).
Managed access using a RADIUS server (refer to Section 13.3 on page 334).
5.2.1 User Accounts
To prevent unauthorized access to the Embedded Web Server, two user accounts are
available: primary and secondary. Each account is composed of three attributes:
username, password and access level. The username and password enable access to the
Embedded Web Server itself; the access level determines the extent of the access (i.e.,
availability of screens and read / write privileges). Note that additional accounts can be
defined using a RADIUS server (refer to Section 13.3 on page 334).
Table 5-1 lists the available access levels and their privileges.