user manual

CiM-25/600L IP Enabled M&C Rev. 1
Operation CD/CIM25600L.IOM
8
3.2.1 SECURITY TOOLS
3.2.1.1 U
SER LOGIN
For the HTTP interfaces the CiM-25 provides three (3) levels of user login. The Telnet
interface, provides the first two (2) of the following levels. The highest level is the
Administrator login. This level allows 100% complete access to all controllable CiM-
25 and equipment parameters. The next level of user login is the Read/Write level. This
level allows access to all controllable equipment parameters but does not allow access to
the administration parameters of the CiM-25 itself. The lowest level of login is the Read
Only login. As the name implies, this level allows the user to view, but not change, the
equipment parameters. Like the Read/Write level, this level does not allow access to the
administration parameters of the CiM-25.
The Name and Password factory defaults for the three level defined above are:
Administrator Level:
Name: admin
Password: 1234
Read/Write Level:
Name: opcenter
Password: 1234
Read Only Level:
Name: monitor
Password: 1234
The SNMP interface uses all three (3) levels of user login utilizing the SNMP v2c
(community string) method of security. The community string is the concatenation of the
name and password, i.e. admin1234, default admin community string.
3.2.1.2 HOST ALLOW LIST
The CiM-25 provides a high degree of security by allowing the Administrator to define a
list of IP addresses to which the CiM-25 will accept/respond to IP datagrams. The
Administrator can select up to six (6) individual allowable IP addresses or up to three (3)
allowable IP address ranges or any combination of individual and ranges that can be
defined by six fields (see HTTP interface below for further details). The host allow list is
applied to all three CiM-25 interfaces (HTTP, SNMP, and Telnet).
3.2.1.3 PING ENABLE/DISABLE
The final piece to the CiM-25 security design is the PING Enable/Disable feature. This
feature allows the Administrator to disable PING on an individual CiM-25. This in effect
conceals the CiM-25 from most hackers.