Hp Remote Device Access Software Bedienungsanleitung Seite 13

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 15
  • Inhaltsverzeichnis
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 12
Chapter 4: iCAS Configuration
The customer can restrict and control HP's use of iCAS to only designated systems to meet security
needs by clicking the Access Control tab.
Figure 4.1 Access Control Tab
Configure Proxy Servers
We use the HTTP Connect method to jump through the proxy server, requesting port 80. Many proxy
servers are configured by default to forbid a CONNECT to port 80. The iCAS will return a "403 Forbidden"
error from the proxy. Change the proxy configuration to allow this CONNECT to port 80. For example, in
the Squid proxy, add port 80 to the Safe_ports ACL. In tinyproxy, add "ConnectPort 80" to the
configuration.
Access Logs
Customers can monitor HP's use of iCAS to see which systems HP accesses. Logs can also be used to
troubleshoot iCAS connection problems. Click the Log tab to view log records and events.
Page 13 of 15HP Remote Device Access 8.1:iCAS User Guide
Seitenansicht 12
1 2 ... 8 9 10 11 12 13 14 15

Kommentare zu diesen Handbüchern

Keine Kommentare