UpdateIPRulesRowDetails
Associated with: SCADAPack x70 RTU Firewall Tables (on SCADAPack x70 Device Configuration items)
Security permission required to access this method: Configure
Notice that the method name is UpdateIPRulesRowDetails (rather than UpdateRTURulesRowDetails). This is because the RTU Firewall Table was previously known as the IP Firewall Table in Geo SCADA Expert 2022 and earlier versions of the product. The existing method name has been retained for backward compatibility.
You use a firewall table to specify what IP traffic is permitted to leave or enter the SCADAPack x70 device. Use UpdateIPRulesRowDetails to define the services for which traffic is permitted.
This method is the equivalent of updating the row properties within ViewX (see Add and Configure the Entries in an RTU Firewall Table).
Use these arguments for updating a row in the RTU Firewall table in the Geo SCADA Expert database.
communication loss
- Row (Byte)—Specify the row number within the table (1 to n).
- IPAddress (Long)—Specify the IP address of the traffic source.
- SubnetMask (Long)—Specify the Subnet mask that is required in conjunction with the IP address to identify the range of IP addresses to which this rule applies.
- PermittedServices (Long)—Specify the services in hexadecimal whose IP packets are permitted. The values for permitted services can be combined.
- 1—DNP3OverTCP
- 2—DNP3OverUDP
- 4—ModbusTCP
- 8—ModbusRTUOverTCP
- 10—ModbusRTUOverUDP
- 20—FTP
- 80—Telnet
- 100—SSH (SCADAPack 47xi devices only)
- 200—IEC 60870-5-104
- 800—TerminalServerSerialPort1
- 1000—TerminalServerSerialPort2
- 2000—TerminalServerSerialPort3
- 4000—TerminalServerSerialPort4
- 8000—NTP (SCADAPack 47xi devices only)
- 10000—HARTPassThrough
- 20000—LogicDebugService
- 40000—ICMPPingTraffic
- 80000—AllICMPTraffic
- 100000—CustomService
- 200000—HTTPSSecureWebServer (SCADAPack 47xi devices only).
- Description (String)—Description of the Firewall entry.
- TrafficDirection (Byte)—Specify the IP packet direction to which this rule is applied .
- 0—InboundAndOutbound
- 1—Inbound
- 2—Outbound.
- PortNumber (Long)—If Custom Service is selected as a permitted service, specify the port number to which the rule applies.
- Protocol (Byte)—If Custom Service is selected as a permitted service, specify the protocol to which the rule applies.
- 0—TCP
- 1—UDP
- 2—TCP and UDP.
Example:
For IP address 192.168.1.97, you might use the hex value C0A80161.
Example:
For Subnet mask 255.255.0.0, you might use the hex value FFFF0000.
Example:
For a row to be DNP3OverTCP and FTP use the hexadecimal value 21.