Version 7.2 73 Mediant 1000B Gateway & E-SBC
User's Manual 6. Web-Based Management
 To log in to the Web interface using CAC:
1. Insert the Common Access Card into the card reader.
2. Access the device using the following URL: https://<host name or IP address>; the
device prompts for a username and password.
3. Enter the password only. As some browsers require that the username be provided,
it’s recommended to enter the username with an arbitrary value.
6.9 Configuring Web and Telnet Access List
The Access List table lets you restrict access to the device's management interfaces (Web,
Telnet and SSH) by specifying IP addresses (up to ten) of management clients that are
permitted to access the device. Access to the device's management interfaces from
undefined IP addresses is denied. If you don't specify any IP addresses, this security
feature is inactive and the device can be accessed from any IP address.
The following procedure describes how to configure the Access List through the Web
interface. You can also configure it through ini file (WebAccessList_x).
Note:
• Configure the IP address of the computer from which you are currently logged into
the device as the first authorized IP address in the Access List. If you configure
any other IP address, access from your computer will be immediately denied.
• If you configure network firewall rules in the Firewall table (see ''Configuring
Firewall Rules'' on page 163), you must configure a firewall rule that permits traffic
from IP addresses configured in the Access List table.
 To add IP addresses to the Access List:
1. Open the Access List table (Setup menu > Administration tab > Web & CLI folder >
Access List).
Figure 6-25: Access List - Adding IP Address
2. In the 'Add an authorized IP address' field, configure an IP address, and then click
Add New Entry; the IP address is added to the table.
Figure 6-26: Web & Telnet Access List Table
If you have configured IP addresses in the Access List and you no longer want to restrict
access to the management interface based on the Access List, delete all the IP addresses
in the table, as described in the following procedure.