• About documentation
  • Layout themes of the Admin Panel
  • Introduction
    • System overview
    • Supported protocols
      • Citrix StoreFront (HTTP)
      • HTTP
      • ICA
      • Modbus
      • MS SQL (TDS)
      • MySQL
      • RDP
      • SSH
      • Telnet 3270
      • Telnet 5250
      • Telnet
      • VNC
      • X11
      • TCP
      • Secret Checkout
    • Deployment scenarios
    • Connection modes
    • User authentication methods and modes
    • Security measures
      • Data encryption
      • Backups
      • Permissions
      • Sandboxing
      • Reliability
      • Cluster configuration
    • Data model
    • Dashboard
      • Widgets
      • Adding, customizing and removind dashlets
      • Hard drives status information
    • User Portal (Access Gateway)
    • Third-Party Licenses
  • System deployment
    • Requirements
    • Hardware overview
    • System initiation
  • Quick start
    • SSH
      • Prerequisites
      • Configuration
      • Establishing connection
      • Viewing user session
    • SSH in bastion mode
      • Prerequisites
      • Configuration
      • Establishing connection
      • Viewing user session
    • RDP
      • Prerequisites
      • Configuration
      • Establishing an RDP connection with a remote host
      • Viewing user session
    • RDP in bastion mode
      • Prerequisites
      • Configuration
      • Establishing an RDP connection with a remote host
      • Viewing user session
    • Telnet
      • Prerequisites
      • Configuration
      • Establishing a telnet connection with the remote host
      • Viewing user’s session
    • Telnet 5250
      • Prerequisites
      • Configuration
      • Establishing a telnet connection with the remote host
      • Viewing user’s session
    • MySQL
      • Prerequisites
      • Configuration
      • Establishing connection with a MySQL database
      • Viewing user session
    • MS SQL
      • Prerequisites
      • Configuration
      • Establishing connection with a MS SQL database
      • Viewing user session
    • HTTP
      • Prerequisites
      • Configuration
      • Connecting to remote resource
      • Viewing user session
    • Citrix
      • ICA
        • Prerequisites
        • Configuration
        • Creating .ica file with connection parameters
        • Connecting to remote resource
        • Viewing user session
      • ICA via Citrix StoreFront
        • Prerequisites
        • Configuration
        • Connecting to remote resource
        • Viewing user session
    • VNC
      • Prerequisites
      • Configuration
      • Establishing connection
      • Viewing user session
    • Oracle over RemoteApp
      • Prerequisites
      • Configuration
      • Changing registry entries on the RDS domain controller
      • Establishing connection
      • Viewing user session
    • User authentication against external LDAP server
      • Prerequisites
      • Configuration
  • Users
    • Creating a user
    • Editing a user
    • Blocking a user
    • Unblocking a user
    • Deleting a user
    • Time access policy
    • Authentication failures counter
    • Roles
    • Users synchronization
    • Two-factor OATH authentication with Google Authenticator
      • Protocols Supporting OATH Authentication Method
      • Configuring the OATH Authentication Method
  • Servers
    • Creating a server
      • Static server
        • Creating a Citrix server
        • Creating an HTTP server
        • Creating an ICA server
        • Creating a Modbus server
        • Creating a MS SQL server
        • Creating a MySQL server
        • Creating an RDP server
        • Creating an SSH server
        • Creating a Telnet server
        • Creating a Telnet 3270 server
        • Creating a Telnet 5250 server
        • Creating a VNC server
        • Creating a TCP server
      • Dynamic server
        • Creating a dynamic servers group
        • Adding a single host to a servers group
    • Editing a server
    • Blocking a server
    • Unblocking a server
    • Deleting a server
      • Deleting a static server definition
      • Deleting a dynamically added host
  • Accounts
    • Creating an account
      • Creating an anonymous account
      • Creating a forward account
      • Creating a regular account
    • Editing an account
    • Blocking an account
    • Unblocking an account
    • Deleting an account
    • Managing security alerts
      • Triggering password change
      • Ignoring security alert
  • Listeners
    • Creating a listener
      • Creating a Citrix listener
      • Creating a HTTP listener
      • Creating an ICA listener
      • Creating a Modbus listener
      • Creating a MySQL listener
      • Creating an RDP listener
      • Creating an SSH listener
      • Creating a MS SQL listener
      • Creating a Telnet listener
      • Creating a Telnet 3270 listener
      • Creating a Telnet 5250 listener
      • Creating a VNC listener
      • Creating a TCP listener
    • Editing a listener
    • Blocking a listener
    • Unblocking a listener
    • Deleting a listener
  • Safes
    • Creating a safe
    • Editing a safe
    • Blocking a safe
    • Unblocking a safe
    • Deleting a safe
  • Discovery
    • Creating a rule
    • Creating a scanner
    • Manage accounts
  • Password changers
    • Password changer policy
      • Defining a password changer policy
      • Editing a password changer policy
      • Deleting a password changer policy
    • Custom password changers
      • Defining a custom password changer
      • Editing a custom password changer
      • Deleting a custom password changer
    • Connection modes
      • SSH
      • LDAP
      • Telnet
      • WinRM
    • Setting up password changing on a Unix system
    • Plug-ins
      • Developing plug-ins
        • Development environment
        • Plugin structure
        • Preparing plug-ins for deployment
      • Uploading plug-ins
  • Policies
  • Downloads
    • Sessions
    • Files
  • Account activity in the User Portal (Access Gateway)
  • Access requests
    • Awaiting requests
    • Active requests
    • Archived requests
  • Sessions
    • Filtering sessions
      • Defining filters
      • Managing user defined filter definitions
      • Full text search
    • Viewing sessions
    • Pausing connection
    • Terminating connection
    • Joining live session
    • Sharing sessions
    • Commenting sessions
    • Sessions’ retention lockdown
    • Exporting sessions
      • Export Session File Formats
    • Deleting sessions
    • OCR processing sessions
    • Session data replication
    • Timestamping selected sessions
    • Cancelling sessions timestamping
    • Require approval for access
      • Approving pending user requests
      • Declining pending requests
    • AI sessions processing
      • Content models
      • Session scoring
      • Quantitive models
  • Reports
  • Productivity
    • Overview
    • Sessions analysis
    • Activity comparison
  • Administration
    • System
      • Date and time
      • SSL certificates
      • Deny new connections
      • SSH access
      • Sensitive features
      • System update
        • Updating system
        • Deleting upgrade snapshot
      • License
      • Hotfix
      • Diagnostics
      • Configuration encryption
      • Default domain
      • Password complexity
      • Single Sign On
        • Setting up Fudo PAM for SSO
        • Single Sign On in Admin Panel
        • Single Sign On in User Portal
        • Setting up domain controller
        • Setting up user workstations
      • Password changers - active cluster node
        • Cluster Password Changers
    • Network settings
      • Network interfaces configuration
        • Managing physical interfaces
        • Defining IP address using system console
        • Setting up a network bridge
        • Setting up virtual networks (VLANs)
        • Setting up LACP link aggregation
      • Labeled IP addresses
      • Routing configuration
      • DNS configuration
      • ARP table configuration
    • Notifications
    • Artificial Intelligence
      • Configuring models trainers
      • Configuring behavioral analysis models
    • Trusted time-stamping
    • Certificate-based authentication scheme
    • External authentication
      • New external authentication server definition
      • SMS authentication definition
      • DUO authentication definition
      • Azure authentication definition
      • Okta authentication definition
    • External passwords repositories
      • CyberArk Enterprise Password Vault
      • Hitachi ID Privileged Access Manager
      • Lieberman Enterprise Random Password Manager
      • Thycotic Secret Server
    • Resources
      • RDP/VNC login screen configuration
      • User portal login screen configuration
    • System version restore
    • System restart
    • SNMP
      • Configuring SNMP
      • SNMP MIBs
      • Getting SNMP readings using snmpwalk
      • Fudo PAM specific SNMP extensions
    • Backups and retention
      • System backup
      • Data retention
    • External storage
      • Configuring external storage
      • Expanding external storage device
    • Exporting/importing system configuration
      • Exporting system configuration
      • Importing system configuration
    • Cluster configuration
      • Initiating cluster
      • Adding cluster nodes
      • Editing cluster nodes
      • Deleting cluster nodes
      • Redundancy groups
    • Events log
      • External syslog servers
      • Exporting events log
    • Changing encryption passphrase
    • Integration with CERB server
    • System maintenance
      • Backing up encryption keys
      • Monitoring system condition
      • Health Check
        • API Health Check
      • Call Home
      • Hard drive replacement
      • Resetting configuration to default settings
  • Reference information
    • RDP connections broker
    • Log messages
    • ICA configuration file
      • Non-TLS connections ICA file
      • TLS connections ICA file
    • Footer Information
  • Fudo Officer 1.0
    • Configuration
    • Managing session requests
    • Settings
  • AAPM (Application to Application Password Manager)
    • Compiling fudopv tool
      • Python
      • Virtual environment
      • Fetching dependencies
      • Package creation script
    • Deploying fudopv without compiling source files
    • Using fudopv
    • API interface
    • Authentication methods
      • Static password
      • Token
  • Ticketing systems
  • Client applications
    • PuTTY
    • Microsoft Remote Desktop
    • VNC Viewer
    • SQL Server Management Studio
  • Troubleshooting
    • Booting up
    • Connecting to servers
    • Logging to administration panel
    • Session playback
    • Cluster configuration
    • Trusted timestamping
    • Support mode
  • Frequently asked questions
  • Glossary
API Documentation
User Access Gateway
PDF PL
Fudo PAM 5.2
A newer version of the product is available! Check the latest documentation.
  • Start »
  • Administration »
  • Network settings

Network settings¶

  • Network interfaces configuration
    • Managing physical interfaces
    • Defining IP address using system console
    • Setting up a network bridge
    • Setting up virtual networks (VLANs)
    • Setting up LACP link aggregation
  • Labeled IP addresses
  • Routing configuration
  • DNS configuration
  • ARP table configuration

To change network settings select Settings > Network configuration.

../../_images/5-1-network-interface-settings.png
Next Previous

© Copyright 2022, Fudo Security Inc.