Access Control
Update Date:2025-05-09 14:53:44
In order to meet the security access requirements of more users for intranet penetration applications, the Aweshell has introduced the [Access Control] function. Users only need to access the https:// B .oray.com to enter the Aweshell management platform, and this function can be viewed in the left navigation bar.
The following Aweshell [access control] function of the relevant introduction and operation instructions.
#1. Feature Introduction Aweshell access control, you can set the specified time, region, IP, browser, system and other methods to apply access restrictions. Users can set multiple access restrictions for one intranet mapping. !
#2. Operation steps After the access control function is enabled, go to [Aweray Aweshell Management Platform]-> [Access Control]-> [Set Now] to set access control. !
2.1 password verification
Setting Items | Function Introduction |
---|---|
Rule name | Custom access rule name |
Intranet Mapping | Select the mapping for which access control needs to be set |
Password Authentication | After opening the password and setting the password, you need to verify the password before you can connect to the webpage class mapping to ensure website security |
2.2 time limit
Setting Items | Function Introduction |
---|---|
Rule name | Custom access rule name |
Intranet Mapping | Select the mapping for which access control needs to be set |
Period Limit | The map is allowed to be accessed only if it is set within the corresponding period. |
Time Limit | Only within the specified time period can the selected mapping be allowed/denied to be accessed by selecting a single setting. A maximum of 5 time periods can be added. It can be used in combination with the fine-grained cycle limit Allow: Allow access to the mapping within the specified time period Forbidden: Forbid access to the mapping within the specified time period Example: 09:00-18 working hours: access to the office system is allowed only during 00, and access is prohibited for the rest of the time |
2.3 area restrictions
Setting Items | Function Introduction |
---|---|
Rule name | Custom access rule name |
Intranet Mapping | Select the mapping for which access control needs to be set |
Region Restriction | Set that only the selected mapping is allowed/denied to be accessed under the specified region restriction conditions, accurate to the city level Allow: Allow the external network access mapping of the checked region Prohibit: Prohibit the external network access mapping of the checked region Example scenario: Only allow the network access mapping of China region |
2.4 IP restrictions
Setting Items | Function Introduction |
---|---|
Rule name | Custom access rule name |
Intranet Mapping | Select the mapping for which access control needs to be set |
IP Restriction | Set that the selected mapping is allowed/denied access only under the specified IPv4 address restriction conditions Allow: Only specific IP addresses are allowed to access the mapping to reduce the risk of hacker attacks Prohibit: For known high-risk IP addresses, blacklist them and prohibit access to the mapping Example scenario: only the specific IP address of the main branch of the company is allowed to access the internal business system |
! Note: ① Up to 100 records can be added to the IP address segment. ② Multiple IP address records need to be set. Click" Import "to add them in batches according to the guidance steps.
2.5 browser restrictions
Setting Items | Function Introduction |
---|---|
Rule name | Custom access rule name |
Intranet Mapping | Select the mapping for which access control needs to be set |
Browser restrictions | Different types and versions of browsers may have security vulnerabilities, which are easily exploited by hackers and pose a threat to business systems. You can set the restrictions of the specified browser type (Google Chrome/Microsoft Edge/Apple Safari/Firefox Firefox) and version to allow/deny access to the selected HTTPS mapping Allow: only the specified browser and its specified version are allowed to access the mapping Forbidden: for the type and version of the browser that is known to have risks, it is blacklisted and access to the mapping is prohibited Example scenario: Only Google Chrome browser is allowed to access the mapping |
2.6 System Restrictions
Setting Items | Function Introduction |
---|---|
Rule name | Custom access rule name |
Intranet Mapping | Select the mapping for which access control needs to be set |
System Restrictions | Similarly to the browser type version, some operating system versions may also have security risks. You can set the restrictions of the specified operating system (Windows/macOS/Linux/Android/iOS) and version to allow/deny access to the selected HTTPS mapping Allow: only the specified system and its specified version are allowed to access the mapping Forbidden: for the system types and versions that are known to have risks, they are blacklisted and access to the mapping is prohibited Example scenario: Only the Windows operating system access mapping is allowed |
At this point, the Aweshell access control tutorial has been introduced. If you have any questions, please contact customer service for consultation.
Did the content of the document help you?
If you encounter product-related problems, you can consult Online customer service Ask for help.