Configuring your firewall to limit access

Specify the ports to which programs can connect and the IP addresses that are allowed to access the firewall. Limiting the allowed port numbers and IP addresses limits the possibility that unauthorized machines can breach the firewall.

You must allow access to the following ports on the exposed host:

You must allow access through the firewall for IP addresses of hosts that send packets through the firewall to the exposed host at your site.

For information about configuring your firewall, see the documentation for your firewall.