Remote host authentication rule - Rule Definition

The Rule Definition panel lets you create a remote host authentication rule. Remote hosts that match the criteria specified in this rule are accessed using the remote host authentication definitions, specified in another panel in this wizard.

The order of rules on this panel determines the order in which the system uses the rules to evaluate whether an agentless device matches.

To re-position a rule, select the rule and use the Move Up, Move Down, Move to Top, and Move to Bottom icons.

To create a remote host authentication rule

  1. Click Add Property Condition. A window opens.
  2. In the first text box at left, enter a property name or click Select Property to choose a property from a list.
    If you click the Select Propertyicon, you can view a subordinate list of properties by clicking the right arrow that appears next to the TARGET* property. When defining remote host authentication rules, use any of following subordinate properties:
    • TARGET.FQ_HOST — Fully qualified name of the target device
    • TARGET.IP_ADDRESS — IP address (IPv4 or IPv6) of the target device
    • TARGET.NAME — Name of the target device
      In addition, you can also use any custom properties that you have defined.
  3. In the next drop-down box to the right, select a comparison-operator, such as contains, equals, does not equal, or starts with.
  4. Use the next field to the right to specify a property value or range of values.
  5. Click OK. The Rule Definition panel shows the condition. To edit the condition, select it and click Edit Selected Condition. To add further conditions, click Add Property Condition again.
  6. If you create multiple conditions, by default the operator for each newly added condition is AND. To change the operator, click in the Operator column at left. Select AND, OR, AND NOT, or OR NOT.
    A typical remost host authentication condition might be:
    (??TARGET*.NAME?? starts with "win2k3") OR (??TARGET*.NAME?? starts with "win2k8")

Where to go from here

Remote host authentication rule - Remote Host Authentications

Was this page helpful? Yes No Submitting... Thank you

Comments