TCP/IP Filtering

The security administrator can enable or disable the security facility that controls TCP/IP traffic within a network. When the TCP/IP filtering component of TCPIPSECURITY is enabled, every incoming or outgoing TCP/IP request is evaluated against access permissions in an active rules file.

Several rules files can be created; however, only one rules file can be active. Rules files can be changed and activated to enforce restrictions for specific conditions or circumstances. Refer to Introduction to Security Center and the Security Center Help for information about using the Security Center interface for creating and using a rules file. See TCP/IP Filtering for more details about TCP/IP rules files, and refer to the Security Center Help for details about creating and testing TCP/IP rules files.