M.2 Restricting connections from unintended hosts
JP1/Base can control the hosts that are allowed to establish connections for the communication between the manager host (source host) and agent hosts (destination hosts). This can prevent unintended hosts from requesting command execution or changing configuration definitions.
The functionality for restricting connections supports the following functions:
-
Command execution function
You can specify the settings required to receive the requests for command execution such that only requests that were sent from the higher-level host registered in the configuration definition are accepted.
-
Configuration management function
You can specify the settings required to receive the requests for changing configurations such that only requests that were sent from the higher-level host registered in the configuration definition are accepted.
-
Operation requests from linkage products (for communication between JP1/Base instances)
You can specify the settings required to receive only the requests that were sent from the hosts you defined, regarding the following linkage:
-
Requests for command execution from JP1/IM - RL
-
Requests for executing operation jobs from JP1/IM - PL
-
Communication when linking between JP1/IM - NP and JP1/Automatic Operation
-
Communication when linking between JP1/IM - NP and JP1/IM - Manager
Figure M‒2: Restricting connections from unintended hosts
-