Page 56 / 64 Scroll up to view Page 51 - 55
52
Web User Interface
N
OTE
:
P
ARENTAL
C
ONTROL
F
LOW
4.6 F
IREWALL
Originally, the term firewall referred to a construction technique designed to prevent the
spread of fire from one room to another. The networking term firewall is a system or group of
systems that enforces an access-control policy between two networks. It may also be
defined as a mechanism used to protect a trusted network from an untrusted network. Of
course, firewalls cannot solve all of the security problems. A firewall is one of the
mechanisms used to establish a network security perimeter in support of a network security
policy. It should never be the only mechanism or method employed. For a firewall to guard
effectively, you must design and deploy it appropriately. This requires integrating the firewall
into a broad information-security policy. In addition, specific policies must be implemented
within the firewall itself.
4.6.1 Content Filter
This page allows certain Web-oriented cookies, java scripts, and pop-up windows to be
blocked by the firewall. A list of "trusted computers" can also be defined that are not subject to
any filters configured. Specific Firewall features can also be enabled. It is highly
Page 57 / 64
53
Web User Interface
recommended that the Firewall is left enabled at all times for protection against Denial of
Service attacks. Go to the Parental Control page to block internet access to specific sites.
Label
Description
Content Filter Settings
Filter Proxy
A server that acts as an intermediary between a user and
the Internet to provide security, administrative control, and
caching service. When a proxy server is located on the
WAN it is possible for LAN users to circumvent content
filtering by pointing to this proxy server.
Filter Cookies
Cookies are files stored on a computer’s hard drive. Some
web servers use them to track usage and provide service
based on ID.
Filter Java Applets
Java is a programming language and development
environment for building downloadable Web components or
Internet and intranet business applications of all kinds.
Filter ActiveX
ActiveX is a tool for building dynamic and active web pages
and distributed object applications. When you visit an
ActiveX web site, ActiveX controls are downloaded to your
Page 58 / 64
54
Web User Interface
browser, where they remain in case you visit the site again.
Filter Popup Windows
Filter those pop windows when visiting some website.
Firewall Settings
Block Fragmented IP
Packets
Enable the firewall to detect fragmented IP packet.
Port Scan Detection
Enable firewall to detect port scan attack.
IP Flood Detection
Enable firewall to detect IP flood attack.
Firewall Protection
Enable firewall function.
Protection against
incoming connection
requests on routed
subnet
Enable firewall to protect all of the routed subnet connected
to the wireless router.
Apply
Click to save the configuration.
Note:
±
Block Fragmented IP Packets
"With this feature enabled, all packets are checked to determine if the packet contains a
"fragment" flag. If the flag exists, the CM will discard the packet. This feature is used
primarily to protect against any intruders/hackers from gaining access to the router or
network." "Under certain conditions, this feature may cause communication issues with
other devices on the network and should be disabled. For example, streaming media
applications may fragment the packets depending on the encoding used for the video stream.
Depending on the encoding used for the clip, some or a majority of the packets will become
fragmented. For clips encoded at 300 Kbps, 66% of the packets are IP fragments, while
below 100 Kbps there is no fragmentation.
4.6.2 Event Log
This page allows configuration of Firewall event log reporting via email alerts and a local
view of the attacks on the system.
Page 59 / 64
55
Web User Interface
Label
Description
Contact E-mail Address
Enter E-mail address for sending Firewall event log.
Email Address Password
The password of the E-mail you enter
SMTP Server Name
Enter SMTP Server Name for sending Firewall event log.
E-mail Alerts
If you enable ,the alert can appearance when have a new
mail
Apply
Click to submit changes.
Description
Summary of this firewall event log.
Count
If a certain firewall event log repeated for several times,
value in count will increase.
Last Occurrence
Display the time when the last of the firewall event
occurred.
Target
Display the destination IP address of this access event.
Source
Display the source IP address of this access event.
E-mail log
Click to send current Firewall event log to e-mail address
specified.
Clear log
Click to clear event log.
4.6.3 Remote Log
This page allows optional configuration of events to be sent to a local SysLog server.
Page 60 / 64
56
Web User Interface
Label
Description
Permitted Connections
Select to record all of the access attempts that are allowed
by firewall.
Blocked Connections
Select to record all of the access attempts that are blocked
by firewall.
Known Internet Attacks
Record event log for known attacks from Internet.
Product Configuration
Events
Record into event log once device configuration is modified
by user or admin.
SysLog server
Define the IP address of the Syslog server.
Apply
Click to make the configuration to take effect.
4.7 T
OOLS
4.7.1 Ping
This page provides ping diagnostics to help with IP connectivity problems.

Rate

4 / 5 based on 1 vote.

Popular Ambit Models

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top