Ip Filtering - Xerox WorkCentre 5735 System Administrator Manual

Hide thumbs Also See for WorkCentre 5735:
Table of Contents

Advertisement

User Data Encryption

IP Filtering

The IP Filtering security feature provides the ability to prevent unauthorized network access based on
IP Address and/or port number filtering rules set by the System Administrator using Internet Services.
Authorized users will be able to create IP Address filtering rules.
Authorized users can enter a list of addresses that are allowed access to the device, and/or a list of
addresses that are not allowed access to the device.
Note:
To configure this feature or these settings access the Properties tab as a System
Administrator. For details, refer to
1.
From the Properties tab, click on the [Security] link.
2.
Select [IP Filtering] in the directory tree.
In the IP Filter Rule List area, the following information is displayed:
Rule Number - Display the rule order. Rule ordering is important in IP Filtering, because rules
can negate each other if placed in an incorrect order.
Action - displays how IP Filtering handles incoming packets.
Source IP/Mask - displays which IP or IP range and network mask the rule has been created
to handle.
Source Port - displays the originating port (if applicable) that the rule has been created to
handle. If the incoming packet did not originate from this source port, the rule is not applied.
Destination Port - displays the port to which the packet was sent. If the incoming packet was
not sent to this port, the rule is not applied.
ICMP Message - displays the ICMP Message the rule was created to handle. ICMP Messages
are only shown when the protocol is set to ICMP.
Protocol - displays which protocols the rule handles.
To Add IP Filter Rule
On the IP Filtering page, click on the [Add] button to display the Add IP Filter Rule page.
1.
2.
In the Define IP Filter Rule area:
a.
From the [Protocol] drop-down list, select the protocol (All, TCP, UDP or ICMP) that the rule
will apply to.
b.
From the [Action] drop-down list, select how you wish IP Filtering to handle the incoming
packets the options are Accept, Drop, or Reject.
c.
From the [Move This Rule To] drop-down list, select either End of List or Beginning of List
for the location of this rule. The order of the rules should be determined by the expected
traffic to the device. Note that rule order is important in IP Filtering because rules can negate
each other if placed in an incorrect order. For example, specific rules should be added to the
top of the list, whereas blanket policies should be added to the bottom of the list
d.
Enter the [Source IP Address] to which this rule will apply.
176
WorkCentre™ 5735/5740/5745/5755/5765/5775/5790
System Administrator Guide
Access Internet Services as System Administrator
on page 24.

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents