Page 106 / 211 Scroll up to view Page 101 - 105
Configuring Security Settings
6.3
Access Control
6
106
© 2010 Verizon. All Rights Reserved.
To configure the FiOS Router’s firewall security settings:
From the General screen, select a security level by clicking the appropriate
1.
radio button. Using the Minimum Security setting may expose the local
network to significant security risks, and thus should only be used for short
periods of time.
Check the “Block IP Fragments” box to protect the local network from
2.
a common type of hacker attack that uses fragmented data packets to
sabotage the network. Note that VPN over IPSec and some UDP-based
services make legitimate use of IP fragments. IP fragments must be allowed
to pass into the local network to use these services.
Click
3.
Apply
to save changes.
6.3
Access Control
Access control is used to block specific computers within the local network (or
even the whole network) from accessing certain services on the Internet. For
example, one computer can be prohibited from surfing the Internet, another
computer from transferring files using FTP, and the whole network from
receiving incoming email.
Access control defines restrictions on the types of requests that can pass from
the local network out to the Internet, and thus may block traffic flowing in both
directions. In the email example given above, computers in the local network
can be prevented from receiving email by blocking their outgoing requests to
POP3 servers on the Internet.
Access control also incorporates a list of preset services in the form of
applications and common port settings.
Page 107 / 211
FiOS Router User Manual
107
© 2010 Verizon. All Rights Reserved.
6.3a
Allow or Restrict Services
To view and allow/restrict these services:
Select
1.
Access Control
from the left side of any Security screen. The “Access
Control” screen appears.
Note:
The “Allowed” section is only visible when the firewall is set to “Maximum.”
Page 108 / 211
Configuring Security Settings
6.3
Access Control
6
108
© 2010 Verizon. All Rights Reserved.
Click
2.
Add
. The “Add Access Control Rule” screen appears.
Note:
To block a service, click
Add
in the “Blocked” section of the Access Control
screen. To allow outgoing traffic, click
Add
in the “Allowed” section of the screen.
If this access control rule applies to all networked devices, select
3.
Any
from
the “Networked Computer/Device” list box. If this rule applies to certain
devices only, select
User Defined
and click
Add
. Then, create and add a
network object (for more details about adding network objects, see the
“Advanced Settings” chapter of this manual).
Select the Internet protocol to be allowed or blocked from the “Protocol”
4.
drop-down list.
If the rule will be active all the time, select
5.
Always
from the “When should
this rule occur?” drop-down list. If the rule will only be active at certain times,
select
User Defined
and click
Add
. Then, add a schedule rule (for more
details about schedule rules, see the “Advanced Settings” chapter of
this manual).
Click
6.
Apply
to save the changes. The Access Control screen will display a
summary of the new access control rule.
Note:
To block a service not included in the list, select
User Defined
from the
Protocol drop-down menu. The “Edit Service” screen appears. Define the service,
then click
OK
. The service will then be automatically added to the top section of
the “Add Access Control Rule” screen, and will be selectable.
An access control can be disabled and the service made available without
having to remove the service from the Access Control table. This may be
useful to make the service available temporarily, with the expectation that the
restriction will be reinstated later.
To temporarily disable an access control, clear the check box next to the
service name.
Page 109 / 211
FiOS Router User Manual
109
© 2010 Verizon. All Rights Reserved.
To reinstate the restriction at a later time, select the check box next to the
service name.
To remove an access restriction from the Access Control table, click
Remove
for the service. The service will be removed from the Access Control table.
6.4
Port Forwarding
Activating “Port Forwarding” allows the network to be exposed to the Internet
in certain limited and controlled ways, enabling some applications to work from
the local network (game, voice, and chat applications, for example), as well
as allowing Internet access to servers in the local network. To set this up on a
networked device, locate the device in the My Network column, then click
Port
Forwarding
. The “Port Forwarding” screen appears.
To set up basic port forwarding:
Click the arrow next to “IP Address forward to or select from menu” to
1.
display
a menu and either enter the IP address of the item to port forward
from, or choose an item from the drop-down menu.
Click the arrow next to “Application to forward…” and select a pre-
2.
configured application from the drop-down menu.
Click
3.
Apply
. The new port forwarding rule appears in the “Applied rules”
table at the bottom of the screen.
To set up advanced port forwarding (custom ports):
Click the arrow next to “Application to forward…” and select
1.
Custom Ports
from the drop-down menu.
Page 110 / 211
Configuring Security Settings
6.4
Port Forwarding
6
110
© 2010 Verizon. All Rights Reserved.
Enter the host name (from the drop-down list) or local IP address of the
2.
computer providing the service in the “Specify IP” text box. Note that only
one local network computer can be assigned to provide a specific service or
application.
Click
3.
Advanced
.
Select the Internet protocol to be provided from the “Protocol” drop-down
4.
list.
Depending on the protocol selected, additional options appear in
the screen.
Select the connection with which this port forwarding rule will be active
5.
from the “WAN Connection Type” drop-down list.
To select a port to forward communications to (this is optional), select
6.
“Specify” from the “Forward to Port” drop-down list, then, in the text box
that appears, enter the port number. If no port is identified, select “Same as
Incoming Port.”
If this port will be active all the time, select “Always” from the “Schedule”
7.
drop-down list. If the rule will only be active at certain times, select “User
Defined” and click
Add
. Then, add a schedule rule (for more details about
schedule rules, see the “Advanced Settings” chapter of this manual).
If source and destination ports need to be specified, select Specify from the
8.
drop-down menu list (by clicking on the appropriate arrow), then entering
the port numbers.
Click
9.
Apply
to save the changes. The new port forwarding rule appears in
the “Applied rules” table at the bottom of the screen.
How many computers can use a service or play a game simultaneously? The
answer may be a bit confusing. All the computers on the network can behave
as clients and use a specific service simultaneously. Being a client means the
computer within the network initiates the connection; for example, a computer
on the network can open an FTP connection with an FTP server on the Internet.
But only one computer on the network can operate as a server and respond to
requests from computers on the Internet (outside the local network).

Rate

3.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top