Systems Insight Manager 6.2 Installation and Configuration Guide for MS Windows

you might want to use Trust All if you have a secure network, and everyone in the network
is trusted.
NOTE: You can add up to five subnet IP address/netmask pairs.
NOTE: If you click IP Binding but do not specify the IP address/netmask, then you might not
be able to connect to the System Management Homepage.
The IP Restricted Logins window appears. The IP Restricted Logins window enables you
to select specific IP addresses or IP address ranges to include or exclude from gaining login
access. Although optional, the System Management Homepage can restrict login access based
on the IP addresses of the machine attempting to gain access.
3. Select Enable IP Restricted Logins, and click Next. The IP Addresses to Include window
appears. This window enables you to specify the IP address or IP address ranges to grant
login access permission. If there are IP addresses in the Inclusion list, then only those IP
addresses are enabled for login privileges. If there are no IP addresses in the Inclusion list,
then login privileges are permitted to all IP addresses that are not in the Exclusion list.
NOTE: A single address and ranges of addresses can be accepted in the IP Restricted
Logins window. Enter the single address in the first box.
4. In the Include field, enter a beginning IP address to which you want to grant login access.
In the To field, enter an ending IP address to which you want to grant login access. All IP
addresses that fall between the beginning and ending IP addresses are granted login access.
Click Add. The IP address or IP address range is added to the Exclusion list. If necessary,
select an IP address or IP address range, and click Delete to remove it from the Exclusion
list. Click Next.
NOTE: If you entered an invalid IP address or IP address range, an error message appears
indicating the IP address is invalid. Click OK. Enter a valid IP address or IP address range,
and click Add again. The IP Addresses to Exclude window appears.
In the Exclude field, enter a beginning IP address to which you want to deny login access.
5. In the To field, enter an ending IP address to which you want to deny login access. All IP
addresses that fall between the beginning and ending IP addresses are denied login access.
6. Click Add. The IP address or IP address range is added to the Inclusion list. If necessary,
select an IP address or IP address range, and click Delete to remove it from the Inclusion
list. Click Next.
NOTE: If you entered an invalid IP address or IP address range, an error message appears,
indicating the IP address is invalid. Click OK. Enter a valid IP address or IP address range,
and click Add again.
NOTE: If you select Next without adding any IP addresses to the Include or Exclude lists,
a warning message appears, stating, IP Restricted Login checkbox will be
marked as disabled. Do you want to proceed without adding any IP
Address restrictions? If you click OK, the IP Restricted Login option on the IP
Restricted Login window is cleared.
The Summary Panel appears. The Summary Panel lists the location where the System
Management Homepage is installed, the amount of space the installation requires, and the summary
of the options that you specified during the installation.
g. Click Next. The installation process is started. Click Finish to exit the wizard.
NOTE: If HP Systems Insight Manager is installed after System Management Homepage is installed,
the System Management Homepage 2048-bit key pair is replaced with the HP Systems Insight
Manager1024-bit key pair.
6. Install OpenSSH:
58 Custom installation