HP Systems Insight Manager 7.1 Installation and Configuration Guide for MS Windows

NOTE: The Trust All option leaves your system vulnerable to security attacks and
sets up the HP System Management Homepage to accept certain requests from any
server. For example, you might want to use Trust All if you have a secure network,
and everyone in the network is trusted.
NOTE: You can add up to five subnet IP address/netmask pairs.
NOTE: If you click IP Binding but do not specify the IP address/netmask, then you
might not be able to connect to the HP System Management Homepage.
The IP Restricted Logins window appears. The IP Restricted Logins window enables
you to select specific IP addresses or IP address ranges to include or exclude from
gaining login access. Although optional, the HP System Management Homepage
can restrict login access based on the IP addresses of the machine attempting to gain
access.
3. Select Enable IP Restricted Logins, and click Next. The IP Addresses to Include window
appears. This window enables you to specify the IP address or IP address ranges to
grant login access permission. If there are IP addresses in the Inclusion list, then only
those IP addresses are enabled for login privileges. If there are no IP addresses in
the Inclusion list, then login privileges are permitted to all IP addresses that are not
in the Exclusion list.
NOTE: A single address and ranges of addresses can be accepted in the IP
Restricted Logins window. Enter the single address in the first box.
4. In the Include field, enter a beginning IP address to which you want to grant login
access. In the To field, enter an ending IP address to which you want to grant login
access. All IP addresses that fall between the beginning and ending IP addresses
are granted login access. Click Add. The IP address or IP address range is added
to the Exclusion list. If necessary, select an IP address or IP address range, and click
Delete to remove it from the Exclusion list. Click Next.
NOTE: If you entered an invalid IP address or IP address range, an error message
appears indicating the IP address is invalid. Click OK. Enter a valid IP address or IP
address range, and click Add again. The IP Addresses to Exclude window appears.
In the Exclude field, enter a beginning IP address to which you want to deny login
access.
5. In the To field, enter an ending IP address to which you want to deny login access.
All IP addresses that fall between the beginning and ending IP addresses are denied
login access.
6. Click Add. The IP address or IP address range is added to the Inclusion list. If
necessary, select an IP address or IP address range, and click Delete to remove it
from the Inclusion list. Click Next.
NOTE: If you entered an invalid IP address or IP address range, an error message
appears, indicating the IP address is invalid. Click OK. Enter a valid IP address or
IP address range, and click Add again.
NOTE: If you select Next without adding any IP addresses to the Include or Exclude
lists, a warning message appears, IP Restricted Login checkbox will
be marked as disabled. Do you want to proceed without adding
any IP Address restrictions? If you click OK, the IP Restricted Login option
on the IP Restricted Login window is cleared.
74 Custom installation