Product User Guide
76
Appending a Rule
Enter the IP/Mask and set the policy. Finally, press the Append button.
Inserting a Rule
Enter the rule number, the IP/Mask, and set the policy. Finally, press the Insert button.
Replacing a Rule
Enter the rule number, the IP/Mask, and set the policy. Finally, press the Replace button.
Deleting a Rule
Enter the rule number and press the Delete button.
Example of Use:
In the following example (Figure 65) the Intel
®
RMM2 is configured to be inaccessible for all IP
addresses, except for the IP addresses which follow the two rules below:
Table 5: Example of IP Access Control
Rule
#
IP/Mask Policy Effect
1 192.168.5.0/24 ACCEPT All IP addresses of the Private
Class C (16-bit block) subnet 5
can access the RMM2 module.
2 192.168.1.46/32 ACCEPT Only the host with the IP
address “192.168.1.46/32” of
the Private Class C subnet 1
can access the RMM2 module.
Figure 65: Example of IP Access Control