Configuring with Web Based Management
4.8 "Security" menu
4.8.3.6
IP Rules
On this WBM page you specify your own IP rules for the firewall. These IP rules have a
higher priority than the predefined IP rules.
Description of the displayed boxes
This table contains the following columns:
● Select
Select the check box in the row to be deleted.
● Protocol
Shows the version of the IP protocol.
● Action
Select how incoming IP packets are handled:
– "Accept" – The data packets can pass through.
– ""Reject" – The data packets are rejected, and the sender receives a corresponding
– "Drop" – The data packets are discarded without any notification to the sender.
● From / To
Specify the direction of the IP rule.
● Source (Range)
Enter the IP address or an IP range that is allowed to send IP packets.
– If the rule is intended to apply to an IP range, enter the range with start address "-"
– If the rule is intended to apply to all IP addresses , enter " 0.0.0.0/0".
● Destination (Range)
Enter the IP address or an IP range that is allowed to receive IP packets.
– If the rule is intended to apply to an IP range, enter the range with start address "-"
– If the rule is intended to apply to all IP addresses , enter " 0.0.0.0/0".
158
message.
end address , for example 192.168.100.10 - 192.168.100.20.
end address , for example 192.168.100.10 - 192.168.100.20.
SCALANCE S615 Web Based Management
Configuration Manual, 05/2015, C79000-G8976-C388-02