We would be honored if you visited our blog Visit the GSW Forums and read/post/reply to topics and questionsView GSW Training Videos on Team Services
Thanks for viewing information about Georgia SoftWorks Security Questions
UTS - Security - Restrict Access - Connection Count by IP Address  
You are viewing UTS Security Questions    
Our News

2017 at GSW

View our Updated Forums

Connect with GSW

Stay current with GSW by connecting with us through our blog and our social media pages.





GUI Config Tool

GSW Telnet Server GUI Configuration Tool

Windows Explorer style interface allowing provisioning and configuration management. Familiar to use operations such as copy, paste, rename, delete, export, import are applied to configurations on a user or system basis. Create templates and quickly view summary configuration data.

TEAM SERVICES  provides your mobile device users a breakthrough in Telnet/SSH2 technology that shatters all prior usability and efficiency standards by allowing unprecedented user collaboration.  Now mobile device users are empowered to share resources, transfer, swap, share and recover dropped sessions. All from the mobile device, no system administrator necessary. All operations can be performed in under 60 seconds.

Video Overviews

Team Services  the first feature set to offer Video overviews. We are excited to provide additional methods to meet customer expectations. Visit the GSW Video Channel!

Request a Webinar

Want to know more about UTS, RC MDMS or GSWBrowse? Request a Webinar. Give us a call or use our contact form and request a webinar.

Privacy Policy - Terms of Use

 

Restrict Connection based on Connection Count By IP Address

Examples: IP Address Count Restriction

The system administrator may want to limit the number of simultaneous logons from specific IP Addresses. This is especially useful for ASP environments where many users access the GSW UTS from locations that can be identified by a specific IP Address. The system administrator may want to limit the number of simultaneous connections for a variety of reasons that range from server resource allocation to purchased access.

Restrictions based on the number of sessions originated from specific IP Addresses are enforced when the file gs_l_ip.txt exists. IP Addresses with connection restrictions counts are listed in the gs_l_ip file. For each entry in the gs_l_ip file two fields are specified: The IP Address and the Count.

How to set up IP Address Count Restrictions

Notice the file in the GSW UTS installation directory:

  • gs_l_ip.txt

The file must reside in the Georgia SoftWorks Universal Terminal Server installation directory.

Note: The system account must have permission to read the gs_l_ip.txt file.

It is a text file

The # character is the comment character.

Each entry must start in the first column.

Each entry consists of the IP Address (or IP Address Range) and the Count.

The IP Address and the Count are separated by a single space.

Following are example gs_l_ip.txt file.

Example 1: IP Address Count Restriction

ACME ASP is an Application Service Provider where they have a Medical Database Lookup Application (MDLA) located on a server at their headquarters. They sell access to the MDLA based to companies where pricing is based on the number simultaneous connections. Due to the sensitive nature of Medical information access is only granted from specific locations that can be associated with known IP Addresses. In addition, each User has access to private medical information based on their User ID. The typical ACME customer may have 300 users that need access to the MDLA but no more than 20 will be using the system at any given time.

Currently AMCE has sold access to the MDLA to 4 companies. Two companies purchased twenty connections each; the remaining two companies purchased twenty-five connections each.

ACME only wants to restrict each company to the number of sessions that they have purchased.

The ACME System Administrator can configure the gs_l_ip.txt file that specifies the number of sessions allowed for each User ID. The Information for each company is:

 

Company Name IP Address or Range Number of Concurrent Sessions
Health Matters Inc. 192.71.34.107 20
Live Long Insurance 170.40.255.231 25
Grow Tall Pharmaceutical
(They want access from any the following IP Addresses to work.)
164.10.15.210 164.10.15.220
164.10.15.211 164.10.15.221
164.10.15.212 164.10.15.222
164.10.15.213 164.10.15.223
164.10.15.214 164.10.15.224
164.10.15.215 164.10.15.225
164.10.15.216 164.10.15.226
164.10.15.217 164.10.15.227
164.10.15.218 164.10.15.228
164.10.15.219 164.10.15.229
164.10.15.230
20
Sharp Doctors for You
(Sharp Doctors for You has a large range of IP Addresses that are valid.)
205.20.63.0
through
205.20.63.255
25
     
     

This is how to set up the gs_l_ip.txt file to limit the number of connections for each company.

Edit the file gs_l_ip.txt and add the following lines. (Be sure to start in column one)

192.71.34.107 20
170.40.255.231 25
164.10.15.210-164.10.15.230 20
205.20.63.* 25

Each time a logon request occurs the GSW Universal Terminal Server determines if the number of active sessions associated with that the originating IP Address. If the count of active sessions exceeds the configured count in the gs_l_ip.txt file then the Logon is denied

Note 1: An Address range is specified in line 3. 
164.10.15.210-164.10.15.230 20

This translates to include all IP Addresses between:
164.10.15.210 and 164.10.15.230

A sample gs_l_ip.txt file with examples is installed with the software. It can be easily modified and used for your purposes

Note 2: An Address Wild Chard is specified in line 4. 
205.20.63.* 25

This translates to include all IP Addresses no matter what the values for the last field. The list below helps visualize the IP addresses included.

  • 164.10.63.0
  • 164.10.63.1
  • 164.10.63.2
  • ...
  • 164.10.63.253
  • 164.10.63.254
  • 164.10.63.255

A sample gs_l_ip.txt file with examples is installed with the software. It can be easily modified and used for your purposes

 
Share it!    Bookmark  GSW Security: Restrict access based on connections by an IP Address at Delicious Digg GSW Security: Restrict access based on connections by an IP Address Share GSW Security: Restrict access based on connections by an IP Address with your Twitter followers Share GSW Security: Restrict access based on connections by an IP Address at StumbleUpon Add GSW Security: Restrict access based on connections by an IP Address to your Technorati favorites Share GSW Security: Restrict access based on connections by an IP Address on Facebook Share GSW Security: Restrict access based on connections by an IP Address on Blinklist Share GSW Security: Restrict access based on connections by an IP Address on Diigo Share GSW Security: Restrict access based on connections by an IP Address on Reddit Share GSW Security: Restrict access based on connections by an IP Address on Linked In Seed the vine with GSW Security: Restrict access based on connections by an IP Address