firewall_security_settings
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revision | Next revisionBoth sides next revision | ||
firewall_security_settings [2016/11/14 18:46] – lucy | firewall_security_settings [2018/08/28 21:12] – lucy | ||
---|---|---|---|
Line 3: | Line 3: | ||
* **Block Access to SSH**: Click this, if you want to disable SSH access completely | * **Block Access to SSH**: Click this, if you want to disable SSH access completely | ||
* **HTTP & HTTPS Access Range**: You can define the IP Ranges, from which the HTTP or HTTPS service will be reachable. Please note, that your users won't be able to access the phishing simulations, | * **HTTP & HTTPS Access Range**: You can define the IP Ranges, from which the HTTP or HTTPS service will be reachable. Please note, that your users won't be able to access the phishing simulations, | ||
- | * **Custom Admin Port**: define here the port, under which the administrative LUCY access (web based) will be accessible | + | * **Custom Admin Port**: define here the port, under which the administrative LUCY access (web based) will be accessible |
{{ firewall.png? | {{ firewall.png? |
firewall_security_settings.txt · Last modified: 2019/07/25 12:49 by 127.0.0.1