Hi there,
First, a warning: these devices are usually quite fragile and vulnerable - make sure you expose them to only what is needed and that it has been properly hardened.
Regarding the access, can be a number of things. Can you share the redacted configuration using the instructions provided here?