Creating a TCP Server

  1. Click + icon next to the Servers tab of the Session Management sub-section, or

  2. Select Session Management > Servers and then click + Add server.

  1. Enter server’s unique name.

  1. Select Blocked option if the object should be unavailable after creation. A blocked server cannot be used to establish connections until it is manually unblocked. Providing a reason for blocking is required.

  2. Optionally, click the Description checkbox and provide a text that will help identifying this server object.

SETTINGS TAB

  1. Go to the SETTINGS tab.

  2. In the Protocol section, select TCP.

  3. Select the Use SSH tunnel option and provide the SSH tunnel key if you want to establish the connection through an SSH reverse tunnel.

Note

  1. If you do not use the SSH tunnel, from the Network address drop-down list, select the IP address from which connections to the monitored server will be initiated, and then configure the Destination settings.

Warning

After server’s definition is saved, protocol’s field is uneditable.

Note

  • The Network address drop-down list elements are IP address defined in the Network configuration menu (Network Interfaces Configuration) or labeled IP addresses (Labeled IP Addresses).

  • In case of cluster configuration, select a labeled IP address from the Network address drop-down list and make sure that other nodes have IP addresses assigned to this label. For more information refer to the Labeled IP Addresses topic.

  1. In the Destination section select Host, IPv4 or IPv6. Enter server’s IP address.

Note

  • Depending on selected option, default values for the Mask and Port fields are filled out automatically. This way the Fudo Enterprise system detects server as one with unique address. In order to set up address for entire subnet, provide a dedicated value for the Address and the Mask fields.

  • In the case of overlapping address definitions, during connection establishment the more specific configuration (higher network mask) is always selected, even if the user does not have permissions assigned to it. This mechanism enables defining exceptions within broader access rules (e.g., granting access to /24 while explicitly excluding /32).

../../_images/5-3-servers-tcp-def.png
  1. Click Save.

OBJECT RIGHTS TAB

The OBJECT RIGHTS tab is used to define which users and roles are allowed to manage the object and which capabilities (Read, Modify, Delete, Block) are assigned to them.


  1. Go to the OBJECT RIGHTS tab.

  2. Open the USERS sub-tab.

  3. Click Assign User, select the users from the list, and click Save.

  4. In the Users list, select the capabilities for each user by enabling the options available for the given object, such as Read, Modify, Delete, or Block.

  5. Open the Roles sub-tab.

  6. Click Assign Role, select the roles from the list, and click Save.

  7. In the Roles list, select the capabilities for each role by enabling the options available for the given object, such as Read, Modify, Delete, or Block.

../../_images/6-0-servers-object-rights.png

Related topics: