iPrism
Type the IP address range for the sending machine or set of machines in the Source IP Start
4.
and End fields.
Type the IP address range for the receiving machine or set of receiving machines in the
5.
Destination IP Start and End fields.
If this exception applies to all ports, select All Ports. If it applies only to specific ports, select
6.
Specific Ports and type the ports to which this exception applies. Use commas to separate
multiple ports. A range of ports can be specified as well (e.g., 80 – 120, or 1 – 79, 81 – 65535).
In Protocols, check either TCP or UDP. If you select both TCP and UDP, all IP protocols will be
7.
blocked, including ICMP and others. At least one must be selected.
Click OK.
8.
Editing an Exception
In the Exceptions window, select an exception and click Edit.
1.
Make changes as needed.
2.
Click OK to save your changes.
3.
Deleting an Exception
In the Exceptions window, select an exception and click Delete.
1.
Click Yes to confirm.
2.
Remote Users
iPrism provides comprehensive Internet security for off-premises users (see
mobile laptops and/or remote users must be provisioned in order to utilize this capability.
Before setting up remote users:
Upload a remote filtering license key (see
1.
back into your iPrism.
Enable Remote Filtering and download the client software via Profiles & Filters > Remote
2.
Filtering.
Chapter 4 Users & Networks
License
Key). You may be logged out and have to log
Administration Guide
Remote
Filtering). The
77
Need help?
Do you have a question about the iPrism Web Security and is the answer not in the manual?
Questions and answers