Does anyone have any documentation on this type of Access rule, it would seem that it works like a simple port filter but with user authentication, but there is no real documentation to show what needs to be configured were.

Thanks

Roger