/32 at the end of an IP address to ensure that only that address is allowed.
Example: 10.2.100.29/32 will allow only 10.2.100.29 access.
I P a d d r e s s n o m e n c l a t u r e :
IPv4—10.10.0.0/16, where 10.10.0.0 is the IP address and 16 is the subnet
mask in prefix form. See the table "Subnet Mask Values" on page342 for a list of
subnet mask values.
IPv6—2001:db8::/48, representing 2001:db8:0:0:0:0:0:0 to 2001:d-
b8:0:ffff:ffff:ffff:ffff:ffff.
5.
Click the Add button in the Action column to add the new rule.
6.
The established rule appears in the Network Access Rules window.
Click the Delete button next to an existing rule, if you want to delete it.
2.8.5 HTTPS
HTTPS stands for HyperText Transfer Protocol over SSL (Secure Socket Layer). This
TCP/IP protocol is used to transfer and display data securely by adding an encryption layer
to protect the integrity and privacy of data traffic. Certificates issued by trusted authorities
are used for sender/recipient authentication.
Note: In order to configure HTTPS, you need ADMINISTRATORrights.
68
CHAPTER 2 • VersaSync User Manual Rev. 7.0
2.8 Configuring Network Settings