51
iCOMPEL Deployment Manager (IDM)
User Guide (V3.1.0)
Configuring and Maintaining the
IDM
FTP Service
Settings
Service State
– Default: Enabled. Uncheck this box to disable FTP access.
Supported Protocols
– Fixed default: FTP.
FTP Ports
– Default: 21. Modify or add if you want your
IDM
to accept FTP connections through a different
port.
Passive Port Range
– Default: 59000-59009. Modify the
Low Port
and
High Port
values to specify a different
range.
Transfer Rate
– Default: Limit to 2500 KiB/Second. Modify the
Limit to
value to specify a different transfer
rate.
SSH Service
Settings
SSH Ports
– Default: 22. Modify or add if you want your
IDM
to accept FTP connections through a different
port.
Master Password:
The
Master Password
tab allows you to change the master password. You need the master password to access the
deeper levels of the
IDM
through SSH.
Note
: This is not the same password you use to login to the
IDM
through a browser.
It may be desirable to change the master password, but you must know the existing one to do so. Please contact your
reseller or supplier for the master password.
To enable the new password, you must click the
button and reboot the
IDM
.
Firewall Status:
The
Firewall Status
tab displays the detailed
IDM
firewall activity report.
Understanding the information in that report requires a good working knowledge of IP networking and network security. In
particular, note these points:
The
Chain MANAGER-INPUT
section details the rules governing connections made to the
IDM
on various
Prot
(protocols).
The
IDM
checks the IP address of incoming connections against the
Chain MANAGER-INPUT-ADDRESSES
rule set.
IDM
drops connections from IP addresses disallowed by security settings.
The
IDM
checks allowed connections against the
Chain MANAGER-INPUT-PORTS
rule set.
IDM
drops connections
to a port disallowed by the security settings.
The
Pkts
(packets) and
Bytes
columns show the volume of traffic accepted or rejected by each rule. An unusually
high
number of packets on a
DROP
line might indicate an attack on the
IDM
.