cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
702
Views
0
Helpful
2
Replies

How can I enter a range for IP access to a C40 codec using RemoteAccess Allow?

James Hawkins
Level 8
Level 8

Hi,

I am configuring a C40 codec running 6.1 software.

I want to restrict the systems that can access to codec via SSH/HTTP etc. and have found the RemoteAccess Allow under Configuration > System Configuration > Network

I want to enter a range of addresses (192.168.2.1 to 192.168.2.254) but cannot work out the syntax to do this. The admin guide and API reference mention that ranges are supported but only give examples for specific hosts.

Can anyone help?

1 Accepted Solution

Accepted Solutions

Danny De Ridder
Cisco Employee
Cisco Employee

Hello,

I think the command affects the iptables on the codec which is a linux based system.

For the range 192.168.2.1 to 192.168.2.254 you probably need to specify the following :

xConfiguration Network 1 RemoteAccess Allow: "192.168.2.0/24".

I tried this on my system :

xConfiguration Network 1 RemoteAccess Allow: "144.254.10.0/24"

Then the iptables show following entry :

[dderidde-ex90-home:/var/log/eventlog] $ iptables --list -n

Chain INPUT (policy ACCEPT)

target     prot opt source               destination        

Chain admin (1 references)

target     prot opt source               destination        

ACCEPT     all  --  144.254.10.0/24      0.0.0.0/0          

DROP       all  --  0.0.0.0/0            0.0.0.0/0          

That should do the trick I think.

Danny.

 

View solution in original post

2 Replies 2

Danny De Ridder
Cisco Employee
Cisco Employee

Hello,

I think the command affects the iptables on the codec which is a linux based system.

For the range 192.168.2.1 to 192.168.2.254 you probably need to specify the following :

xConfiguration Network 1 RemoteAccess Allow: "192.168.2.0/24".

I tried this on my system :

xConfiguration Network 1 RemoteAccess Allow: "144.254.10.0/24"

Then the iptables show following entry :

[dderidde-ex90-home:/var/log/eventlog] $ iptables --list -n

Chain INPUT (policy ACCEPT)

target     prot opt source               destination        

Chain admin (1 references)

target     prot opt source               destination        

ACCEPT     all  --  144.254.10.0/24      0.0.0.0/0          

DROP       all  --  0.0.0.0/0            0.0.0.0/0          

That should do the trick I think.

Danny.

 

Thanks Danny,

Worked fine