Items
Settings and Explanation
Permit Access
Select this to permit configured IP packets to pass through.
Refuse Access
Select this to refuse configured IP packets to pass through.
IPsec
Select this to permit configured IPsec packets to pass through.
Local Address (Scanner)
Select an IPv4 address or IPv6 address that matches your network environment. If an IP address is assigned
automatically, you can select
Use auto-obtained IPv4 address
.
Note:
If an IPv6 address is assigned automatically, the connection may be unavailable. Configure a static IPv6 address.
Remote Address(Host)
Enter a device's IP address to control access. The IP address must be 43 characters or less. If you do not enter an IP
address, all addresses are controlled.
Note:
If an IP address is assigned automatically (e.g. assigned by DHCP), the connection may be unavailable. Configure a static IP
address.
Method of Choosing Port
Select a method to specify ports.
❏
Service Name
If you select
Service Name
for
Method of Choosing Port
, select an option.
❏
Transport Protocol
If you select
Port Number
for
Method of Choosing Port
, you need to configure an encapsulation mode.
Items
Settings and Explanation
Any Protocol
Select this to control all protocol types.
TCP
Select this to control data for unicast.
UDP
Select this to control data for broadcast and multicast.
ICMPv4
Select this to control ping command.
❏
Local Port
If you select
Port Number
for
Method of Choosing Port
and if you select
TCP
or
UDP
for
Transport
Protocol
, enter port numbers to control receiving packets, separating them with commas. You can enter 10 port
numbers at the maximum.
Example: 20,80,119,5220
If you do not enter a port number, all ports are controlled.
❏
Remote Port
If you select
Port Number
for
Method of Choosing Port
and if you select
TCP
or
UDP
for
Transport
Protocol
, enter port numbers to control sending packets, separating them with commas. You can enter 10 port
numbers at the maximum.
Example: 25,80,143,5220
If you do not enter a port number, all ports are controlled.
>
>
Encrypted Communication Using IPsec/IP Filtering
149