Firewall rules determine whether to accept or discard traffic to/from the PXE, based on the IP address of the host sending or receiving the traffic. When creating firewall rules, keep these principles in mind:
When traffic reaches or is sent from the PXE device, the rules are executed in numerical order. Only the first rule that matches the IP address determines whether the traffic is accepted or discarded. Any subsequent rules matching the IP address are ignored by the PXE.
When typing the IP address, you must specify BOTH the address and a subnet mask. For example, to specify a single address in a Class C network, use this format:
x.x.x.x/24
where /24 = a subnet mask of 255.255.255.0.
To specify an entire subnet or range of addresses, change the subnet mask accordingly.
Note: Valid IPv4 addresses range from 0.0.0.0 through 255.255.255.255. Make sure the IPv4 addresses entered are within the scope.
Action |
Procedure |
---|---|
Add a rule to the end of the rules list |
|
Insert a rule between two existing rules |
|