Modifying a Firewall Rule for Incoming Activity by IPv6 Addresses
To modify an existing rule for filtering incoming activity by IPv6 address, enter 1 in the Opt field for the rule in the Dynamic Filtering - Incoming IPv6 Address Security screen, shown in Setting Firewall Rules for Incoming Activity by IPv6 Addresses (STRFW > 2 > 2).
The Dynamic Filtering - Modify Incoming IPv6 Address screen appears:
Dynamic Filtering- Modify Incoming IPv6 Address Type choices, press Enter. IPv6 Address . . . . . 2001:CF8:2:5D11:3440:B5FF:FE8D:1 Address prefix length . 128 1-128 Text . . . . . . . . . FTP/ Tel- DB TCP REXEC net Srv SGN DDM Secure value. . . . . . Y Y Y Y Y=Yes, S=SSL only A=Skip checks Rmt Fil B=SSL+Skip checks Srv Srv L=Skip checks+Log Y Y M=SSL+Skip checks+Log Equivalent IP range: IP from: 2001:0CF8:0002:5D11:3440:B5FF:FE8D:0001 IP to : 2001:0CF8:0002:5D11:3440:B5FF:FE8D:0001 SQL statments are not parsed when checks are skipped or rejected. FTP=FTPLOG, REXLOG. DDM=DDM, DRDA. DB Srv=SQLENT, SQL, NDB, OBJINF. F3=Exit F12=Cancel |
Enter or modify information in the following fields:
IPv6 Address
The IPv6 address for the range of addresses. In addition to an IPv6 address, you can set this field to *ALL for rules applied to all IPv6 ranges that aren't otherwise specified.
Address prefix length
The length of the IPv6 address prefix. This can be set to from 1-128.
Text
A free-form text description of the IPv6 address range.
Secure value
A letter or blank space showing how the rule handles incoming activity for that address range for the protocol indicated by the label above the column. The protocols include:
- FTP/REXLOG including FTPLOG and REXLOG
- TELNET for TELNET connections
- DB Srv including SQLENT, SQL, NDB, and OBJINF.
- TCP SGN, the TCP Sign-On Server
- DDM including DRDA
- Rmt Srv, for Remote Program/Command Call
- Fil Srv, for File Server
The possible values are:
- Blank or N: Reject all incoming activity
- S: Allow activity, but do not log this
- Y: Allow activity