The System Users & Management section allows administrators to manage access to the iShield interface.
First-Time Login:
When logging into the iShield for the first time, you will be prompted to change the default admin password. This step is critical for securing your iShield.
From this section, you can:
View existing system users
See last login times
Create new user accounts
Select Add System User
Username: Used to authenticate the user. Usernames are case-sensitive.
Password: The account password which should consist of the following:
Upper Case (A-Z)
Lower Case (a-z)
Digits (1-9)
Special Characters (@!#$)
Length (min 8)
User Disabled: Disables the account
Super Admin: Full access to all iShield settings. Leave unticked to only allow access to the reporting dashboard.
TFA login required: Enforces TFA (Two-Factor authentication)
Select Add TFA Key
Scan the QR code with your authenticator app
Provide a description for the TFA code
Verify your TFA by entering the code from your authenticator app
Select Add TFA key
The Current Sessions section displays all users currently logged into the iShield.
Select the disconnect icon to forcefully log the user out.
Administrators can modify the ports used for management access.
For improved security, remote access can be restricted to trusted source IP addresses.
HTTP Port: The HTTP port number for GUI access
HTTPS Port: The HTTPS port number for GUI access
Restrict access to trusted sources only:
Select Add Trusted Source
Network: Specifies the IP/range that will be trusted
Subnet: The subnet or mask of the network
Select Add Trusted Network
SSH Port: The SSH port number for CLI access
Restrict access to trusted sources only:
Select Add Trusted Source
Network: Specifies the IP/range that will be trusted
Subnet: The subnet or mask of the network
Select Add Trusted Network
SSH Port: The SSH port number for CLI access
Restrict access to trusted sources only:
Select Add Trusted Source
Network: Specifies the IP/range that will be trusted
Subnet: The subnet or mask of the network
Select Add Trusted Network
Allow vendor remote support access: The Vendor Remote Access option allows authorised iShield support personnel to access the unit for troubleshooting and support purposes.
Note: This option should be enabled only when support access is required.