Setting Firewall Rules for Outgoing Activity by IP Address
You can filter outgoing activity by IP address from the Dynamic Filtering - Outgoing IP Address Security screen. To reach the screen, select 5. Outgoing IP Addresses from the Work with Dynamic Filtering screen (STRAUD > 2 > 5).
Dynamic Filtering- Outgoing IP Address Security Type options, press Enter. 1=Select 4=Delete Opt IP Address Subnet Mask FTP Text *ALL 0.0.0.0 *ALL 1.1.1.1 255.255.0.0 Y 1.1.1.29 255.255.255.255 Y fsdf 1.1.1.156 255.255.255.255 RULE SET BY WIZARD 1.1.1.168 255.255.255.255 Y 1.1.1.212 255.255.255.255 Y RLTOOLS 178.249.3.48 255.255.255.255 RULE SET BY WIZARD 185.113.4.132 255.255.255.255 Y 185.113.4.146 255.255.255.255 Y RULE SET BY WIZARD 185.113.4.148 255.255.255.255 Y RULE SET BY WIZARD Bottom F3=Exit F6=Add new F8=Print F12=Cancel |
The screen shows existing rules for filtering activity going out via FTP to specific IP address ranges, as shown by their IP Address and Subnet Mask. The entry for *ALL shows general rules for activity coming going out to IP addresses that are not specifically listed.
The FTP column either is blank or shows a letter indication how Firewall is to filter FTP requests going to that IP Address Range.
- Blank: Reject all incoming activity
- A: Allow activity without checking
- B: Allow only activity over an SSL connection, without parsing SQL statements
- L: Log and allow activity, without checking
- M: Log and allow only activity over an SSL connection, with parsing SQL statements
- S: Allow only activity over an SSL connection
- Y: Allow activity after parsing any SQL statement in the activity
The final Text column shows a freeform text description of the rule.
To modify an existing rule, type 1 in the Opt column for that rule and press Enter.
To add a new rule, press the F6 key.