Please ensure Javascript is enabled for purposes of website accessibility
Powered by Zoomin Software. For more details please contactZoomin

PI System Management Tools

Create a PI Firewall

  • Last UpdatedOct 04, 2024
  • 1 minute read

You can use IP addresses, IP address masks, or host names to limit connections with a PI Firewall. You can restrict connections only from those from the subnets defined for your users. To allow users to create PI Firewalls for Data Archive, use the Database Security tool to grant write access for the PITUNING entry to the appropriate PI identities or PI users. Data Archive recognizes modifications to PI Firewalls within 15 minutes or upon restarting Data Archive, whichever comes first.

  1. Click , or right-click in the Firewall tool and click New.

  2. Use the Firewall Details dialog box to:

    • Select or enter the name of the Data Archive server on which you will create the PI Firewall in the Server field.

    • Enter the IP address, IP address mask, or host name of the computer you want to deny access to in the Host field.

    • Select Disallow in the Value field to deny access to the computer you entered; select Allow to allow to the selected computer.

  3. Select or enter the name of the Data Archive server on which you will create the PI Firewall in the Server field.

  4. Click OK.

TitleResults for “How to create a CRG?”Also Available in